00000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2800202) 13:46:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:38 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:38 executing program 0: 13:46:38 executing program 1: 13:46:38 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8001, 0x8000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x911400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, r1, 0x701, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x70}, 0x1, 0x0, 0x0, 0x4a64d6fa203a9549}, 0x80) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x3) ioctl$TCFLSH(r2, 0x540b, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1) 13:46:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x9, 0x101, 0x200, 0x7, 0x4065ac70}) ioctl$TCFLSH(r0, 0x540b, 0x7) 13:46:38 executing program 1: 13:46:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, ':{)'}, {0x20, './cgroup\x00'}, {0x20, '#'}, {0x20, 'securityposix_acl_access+'}, {0x20, './cgroup\x00'}, {0x20, 'em1lobdev:)wlan0trusted%,bdev\\wlan0user/\xd5wlan0'}, {0x20, 'io.max\x00'}, {0x20, '^proc'}, {0x20, 'cpusetvmnet1+'}, {0x20, 'io.max\x00'}], 0xa, "d63a7e1ca4c208d21268cf07471fdadf3730cfd95381fadfa07506c45586f067fdd64eeeb33f1c7fbdfbb1214ca683cb52fb43153d032a8247ccf3409183bb71cff450907362a5a2e298a1f6b0617fc06e5e8d37a1bf1d75f68a1d576b22eb3d8e4a47a7bec74994111b1316d6212f9aa254f94f96b8f535e135193a5c8ded5b14baa39bcbe01d22b9a3027019f7eb1621d6054fcdf55a9911b6593bbd14dface59448289ca0c3a92409844d272c86f05df03e7c4f3367ba2226b0837eb0434a2a4f33e74381de8645f4fec5c1cbda3f093cbdecf16f2c39295e2191088101f4146c022add5e4511c60c80b2073c0613f96b9bf37ad3"}, 0x188) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f00000002c0)) sendfile(r1, r1, 0x0, 0x8) 13:46:38 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, 0x0, 0x0) 13:46:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000000c0)={@remote, @local, @local}, 0xc) 13:46:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:38 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/100, 0xffe4) 13:46:38 executing program 1: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file1\x00', 0xe8) write$P9_RLCREATE(r2, 0x0, 0x0) 13:46:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="747275737465642e6d617810"], &(0x7f0000000100)='eth0em0\x00', 0x8, 0x1) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@v1={0x2, "2638b5be8b"}, 0x6, 0x3) write$cgroup_int(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xffffffffffffff38) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000140)={0x80000000, 0xb2}) sendfile(r1, r1, 0x0, 0x8) 13:46:38 executing program 1: 13:46:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:38 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/100, 0xffe4) 13:46:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0xfffffffffffff801, 0x1, 0x4, 0x9, 0x7fffffff, 0x2}) 13:46:38 executing program 1: 13:46:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='\xfe\xf9P\xa8;\x93s}\b\x84\xf0\x80\xad\x00\x00\x00\x00\x00\x00\x00\x02\x82\x91~5V[\x89\xf8\x8f\xc5|\x86\xc7\x1a\x83\xf5nE\x9d\xf2J\xc6\xd2\xc9d\x00\x8a\xbeJ\xd5\x8d[\xc2_\x88*41\x88\xe2J^Lj\x1br\x9bD7\x9en\x1c=\xcb=\xd0\x94\x16\xc2\xe9\"\xc8\xde\xf1v+E\xac\xef#\b\xac\xd9\x9e\x82\xc1H\xff\xad\xbf\xc3\xa06\xff\xa2\x7f\x05\xe6\xb1\\\xcdU\x99b\xefXj', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="333a320901a644241c30ec3218eed645952cfbe7d1d2738c25c86edaed5743ffb58df6cceafe14c4e4a3dd73e4cda8ab43c5aae44d4e300a94627a50a5555be1048950447e6824314a90b99026c1d6fa28c4a50100b586f5eac23284be37adb28161ace80a504ae7be0109531cf794d432d8cd39eb25a3f231564f3a0bb72e0bc7265b186d3e2049b86ea2e7d4ac557b84f53e41ab8b2312f7438d05bae23e1516b87a75c88d6441366d5e9b664dd6ac3c296c92dd85b04b72d205d7575cea854025927e82ecd07de1f790fdd0079a7a7a2a0667d6d0f9922aed38c26c03dfe2177d6654b7433a05de9355781409765d932668dc8c00ecbb19a226b24fb48bd3438c84115b77a7daa610f410270782443a00000000000000000000000000000000000040ed5ba1d3a79834133dd0a88d2b87010027d3f23fa037cd8bd9cbe1d8a95335b64dc301d7870ab7c7c33639fc27c8457e2ad2a12d55fea9fcf6f2b16abeb0bc44094d3a7e72f466a4b3267ea1c53ea307a06c31ff9703de6ba9c80480cff6a450044322c55024a91e0ec02ae500"], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:39 executing program 0: 13:46:39 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/100, 0xffe4) 13:46:39 executing program 1: 13:46:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, {0xa, 0x4e24, 0x8, @remote, 0x20}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="333a32a9"], 0x4) sendfile(r1, r1, 0x0, 0x8) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) 13:46:39 executing program 3: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) migrate_pages(r0, 0x1, &(0x7f0000000140)=0x20, &(0x7f0000000180)=0x3f) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/112, 0x70) 13:46:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x3f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 13:46:39 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000002c0)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x4402, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f00000001c0)={0xf, @raw_data="f717a2ecba178b98a737b0cc24565d3381343165cb9c616a87fef9ed9fe539a0d079d3541c6324affcefb83f25979e23ee544c1bfe53853b0dbbffa56b2f1e40eb6b2e6e25d7308941aa20e7117d17a16503e3d00a80bdc1f8996640ff075f4e49eb69d965c7e84e570ad9293de1df342814e1ff7ac7b8f49d86fcc4bf6889cc49d048793ab94c0c01dcd6b5360d77b08dcc2385772f00fbdaf77fa199fa094a143a419f6d1b8b60547c082f0db1b465bd4f8cff2e3d73618557539d529aaaf827242929d7f3f121"}) r3 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000340)=0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x81}, 0x28, 0x1) syz_open_procfs(r4, &(0x7f00000000c0)='wchan\x00') write$cgroup_int(r3, &(0x7f00000000c0)=ANY=[], 0xffffffffffffff63) sendfile(r3, r3, 0x0, 0x8) 13:46:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) read(r0, &(0x7f0000000100)=""/4, 0x4) syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300002, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0x3e}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 13:46:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000040)) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) ptrace$peekuser(0x3, r1, 0x9) 13:46:39 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="ee231eba9268005dc5b4aac922e8a5f55791c7034492ab7f5341"], 0x4) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, r1, 0x0, 0x8) 13:46:39 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x55a, 0x155240) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x101400, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000180)={r3, r4, 0xd}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x800, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r5, 0x540b, 0x2) 13:46:39 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x100) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:39 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) 13:46:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0xffffffffffffffff, 0x3c7) setsockopt$sock_int(r0, 0x1, 0x4000000200000002, &(0x7f0000000100)=0x3ff, 0xff22) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 13:46:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='u/syz8\x00\x00\x00\x00\x05\x00\x00\x00cYIk\x84\xfbh\x8e\b\xe7\xe8V\xf7\x17J\xd2q\xedx /@\x8e\x7fBO\xca#\x1e#\x04\x87\xd0\x1e$[B\t\xf7\xd3\xfe\xe2\xd5l\xbd\vf;-e\xfdcK\x16T\x15\xb9^\xa7\xfb\xd3w\x19\x0fD\xe2c\xce!r\x12\xab\x1a\x97nt$\xe0&/\a!s\xdf\xfd\b\xf2\xc7g,\xb2\xfa\x15]\xdb\x06\x02\xcb\xfc\xdem\xb5\xeeC\xa2+\x05\x88Ky/=\xa5w\x99\xc6\xbe\xb1\xb2P\xd0H\xac\x11\xc7S\x9a\xd3\n\xde^\xc2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) acct(&(0x7f0000000000)='./file0\x00') sendfile(r1, r1, 0x0, 0x8) 13:46:40 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000000c0)={0x5, 0x1, 0x5}) [ 222.253700] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:46:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x400, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x200000, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000200)=0x7, 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x440000, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000002100)={'filter\x00', 0x7, 0x4, 0x4a4, 0x140, 0x0, 0x3c0, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000cc0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @mac=@random="2bda50e4f12c", @loopback, @local, 0xf, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, 0x6, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0xf, 0xffffffff}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4f0) ioctl$TCFLSH(r0, 0x540b, 0xe1a1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x301, 0x0) recvfrom$rxrpc(r2, &(0x7f00000000c0)=""/244, 0xf4, 0x10020, 0x0, 0x0) 13:46:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r3, 0x5}}, 0x10) sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r4 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000002c0)={0x8, 0x5, 0x3, 'queue1\x00', 0x6}) write$cgroup_int(r4, &(0x7f0000000280)=ANY=[@ANYBLOB='2:2\t'], 0x4) sendfile(r4, r4, 0x0, 0x8) [ 222.408526] protocol 88fb is buggy, dev hsr_slave_0 [ 222.413681] protocol 88fb is buggy, dev hsr_slave_1 13:46:40 executing program 1: gettid() r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 13:46:40 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x840, 0x80000) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000100)={0x20, 0x2, 'client0\x00', 0xffffffff80000005, "dee44529c0496eef", "50db98bb8ad50aa332d6097fd3b761e6d5178c7de41599c8cb334e6d3032a678", 0x0, 0x1}) 13:46:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xb) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x118) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x0, 0x7fff}, &(0x7f00000001c0)=0x88) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x5, 0x9}, &(0x7f0000000240)=0x8) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f00000000c0)) 13:46:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x2200, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=ANY=[@ANYRESDEC=0x0], 0x14) sendfile(r1, r1, 0x0, 0x8) splice(r1, &(0x7f0000000180), r1, &(0x7f00000000c0), 0x1000000002, 0x1) 13:46:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) [ 222.632835] input: syz1 as /devices/virtual/input/input9 13:46:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = gettid() tkill(r1, 0x3c) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x2, 0x7, 0x10000, 0xb599, 0x3, 0x0, 0x5, 0x2c4, 0x38, 0x2a3, 0xd71, 0x8, 0x20, 0x100, 0x8, 0x6, 0x4}, [{0x6, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x3ff, 0x401, 0xc7}], "b5fc9869f2ae7ed78ee5da92d61e08ed4940ef81688a", [[], [], [], [], [], [], [], [], [], []]}, 0xa6e) creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) 13:46:40 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) fcntl$setown(r0, 0x8, r1) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000140)=ANY=[@ANYPTR], 0xb5) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000180)) sendfile(r2, r2, 0x0, 0x8) 13:46:40 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x400200) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f00000000c0)={0xfff, 0x0, @value=0x5}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) r2 = msgget(0x3, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000100)=""/198) 13:46:40 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1105511, &(0x7f0000000040)=0x3) 13:46:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100)='/dev/zero\x00', 0x2200, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000001140)=""/86) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x42, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0086401, &(0x7f00000010c0)={0x1000, &(0x7f00000000c0)=""/4096}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r2, 0x540b, 0x2) 13:46:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC=r1, @ANYRESOCT, @ANYRES16=r0, @ANYRES32=r1, @ANYRESOCT=r1, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYBLOB="cfe903f94b420dab490000f82eea5d5d5d2cd1df176516027ac4b8703b7c7d15866f7a82c9b549c1a5064900000017bda2d18859c6e20024a9d3f9e729ddf481b8de1534038f3cd67aea9f8cb4074f648d7d4a30301417c9", @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRES16=0x0, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRESOCT=r0], @ANYRESDEC=r0]], 0x3b) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x6, 0x1, 0x80000001, &(0x7f0000000000)=[0x0], 0x1}, 0x20) sendfile(r1, r1, 0x0, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x80000, 0x0) 13:46:40 executing program 4: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x9) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r0, r1) syz_open_pts(0xffffffffffffffff, 0x200) getresgid(&(0x7f0000000280), &(0x7f00000000c0), &(0x7f0000000300)) 13:46:40 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0984124, &(0x7f0000000000)) 13:46:40 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:40 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x8, &(0x7f0000000000)=0x0) io_getevents(r0, 0x5, 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], &(0x7f00000002c0)={0x0, 0x989680}) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) 13:46:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x5) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:40 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc4c85513, &(0x7f0000000040)=0x7) 13:46:41 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) fcntl$setlease(r1, 0x400, 0x3) 13:46:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x400, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000180)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x4}}, 0x10) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 13:46:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x220, 0x0, 0x0, 0x10000007a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0af51f023c123f3188a070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000340)={0x20000000007b, 0x0, [0x200000491]}) 13:46:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x800, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8bc) 13:46:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x200) ioctl$UI_DEV_CREATE(r1, 0x5501) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) r3 = getuid() r4 = getpgid(0xffffffffffffffff) sendmsg$nl_netfilter(r1, &(0x7f0000001a40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10020000}, 0xc, &(0x7f0000001a00)={&(0x7f0000000280)={0x175c, 0xb, 0x3, 0x0, 0x70bd2d, 0x25dfdbfc, {0x7, 0x0, 0x4}, [@nested={0xa4, 0x11, [@typed={0x8, 0x59, @uid=r2}, @typed={0xc, 0x54, @u64=0x540}, @generic="7f4071e53248c0e9e6fe9ddb1c95272164cb2b52499710380676cdc5d522e67ed21985547ba08fed62b2c8b1b62b907ac20b01bdd7b61aa54746876b1b37386742203657282cd4fbc9c21bd434486a66ef9a675d63e34c0afb5004602804df2c31640855e46dce6b3aa8bf328d658b0d47", @typed={0x8, 0x2, @u32=0x4}, @typed={0x10, 0x5c, @str='self@/)[\x00'}]}, @nested={0x10f4, 0x8d, [@generic="f147ef15c3dcac23d462366af12480812765f4d926ff5c7bf24bf6672999e0041b450e6645a9a81eb4b75f31f5d75c134a51da4456d27c3f30c2b25801c891887d45677a018e82d1adb187380efff4734f420711a6ce78f48963c99c891819d6431fff3372ed32d517d2c7ae79d36e3f84dee328ee9e78a151548db2fc422189175bc32e41aa5a64e41bf9ef8d9e4d1a2fe9f2b8898283bee54d18eda17d1396a717bf3140a3c33359dd411ad9bec23be8ae4e4e3844e99d0609f2b89280a7f4f92d0843bf405a16fa005958b7ca0caa08fbed7b7b02c2e38f78600496f7485ec10e", @typed={0x8, 0xb, @fd=r1}, @typed={0x1004, 0x57, @binary="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"}]}, @nested={0x2cc, 0x9, [@typed={0x4, 0x55}, @generic="8401946fccb2c55a7bcb822062c9b3a3a6c2200a37819bd4434bc348f57ff79f83eb4a191e6e51bd78566a44d534bdf8de5deafa0f85567f593eed0bed", @generic="d3694c090183ac1ba79ea7d3ff68d56e451e37d3277868fbd0abdd8613377756a9c1275e0e3507fbdc86b66a70a514454a212f6f7df33ef6f4834433ba85104abbc674dd74e8540ba30e321aa57b1cc35852205bf37483cf9f96b6ba847c8d11ac3919fd88aba48478262d6332cdac0e0fc357cdf74f83b36c8b11729883f1d3d5a66865209c14c42749869721ea976921c2d3e84fe4", @generic="14df65735275399152a03a1ed9f757e648c04700b61424d80bac8ac411", @generic="b649390c90b690b2b161c2bae20c014a19895b0fd1ccbf03bfde2c694eccc18b01f6be5d08f61a13891e3e3a41eaefba5c7d64", @typed={0x20, 0x41, @binary="b7ee282ef76dc89f92284d5851adfee7a676ee3979eff983ea657e"}, @generic="24f5760795ec98b9eb8ead1b8e6ba4ccbcb400a35032db52da9d7f6933d7bda6dda0b8f244db6252b6515c527f0dc44357f0eaa5f0043875af4960611ee86f0426bb9c76e9853f84010c4b0154f2f5786a1bb746553d45ab675a603ae01eadc23ca885581e6676d0fbfa8f9eb349b20ef4ff7b420ae8ac57f805c9f0d2b847e5f4fe15ab466e2a352dc06b9c16db2d9302027e397eae318d5241", @generic="91265d4aa6b119a6d8e99fb582186880dca065596ba8cf08f86551656df6fb8a4d5b163e01464d58087c080ed450c58ed3dc80e73e763001fd44fd2c9157bc7cb827a89d165914fd2aaf23bcf4142c4560d8ded35043c01462df0454b10cdc856c3261c92701edb2f276fdf18df3b61844ac7966a615d9d149903f7c0c98e59c2940e8187ffdf62348d15f3d25b79ed7859435fc47e48e2702d341afa14c6cd7d68d1d8144fbd835859b0cdefc5261e5ca0317a3ce8e9bdfbef384a238e07279bdedc52447a1cb7ecc94ef6d8fb86f70e71a8949f312f6fd32abc0f12b", @typed={0x8, 0x83, @u32=0xff}]}, @nested={0xcc, 0x5a, [@typed={0x8, 0x70, @uid=r3}, @generic="02b50bc0ddc76b3f66b882169e847809e3e752e7f9630d4f10b704900df16add4153f9cc3bf8ced217979f11835fc4996738ef729ecbe2bca0a9581cfa95c7a3e9837737d650cdcc7595730f0df05e5e59ca124f882e697ed93e8b7a0b941d8a5051cbf291b6b574c7bf916e7d7a538211bf7fb279bdcfb95c05e405377a5c6472e1c763a3c89a4bd2268718fb4496e35a3574143d8a1a20d8e4e974cb50b4350dbc1e709be142c999c428838c0528baea11af74948fc861d1b4e26528"]}, @nested={0x24, 0x1, [@generic="8aa97a24ebf2fd591f6e8cecf8eb472e8df72a02e656d1608562114e7de9"]}, @nested={0x1b4, 0x9, [@typed={0x8, 0x74, @pid=r4}, @typed={0x14, 0x3e, @ipv6=@remote}, @generic="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", @generic="c133ec896c7044c82d3fcb375e8aac7edfd4ea24b6f1981707a0f08e475800ce5af51d140e5d013ff59910a5be40a375045d676e3024ff98cb94ca772d9a30984408e5abec79968e6d27a416d9ba15b52c5992ccf45795932b1e5a55d2be855f5619ae14125a57890346ece23f557e3f8c14f21426d2c4489e269d0870", @typed={0x14, 0x4a, @ipv6=@empty}, @typed={0x8, 0x6, @u32=0x7}]}, @typed={0xc, 0x41, @u64=0x4d5}, @typed={0x34, 0x35, @binary="d979c1b5dee1747404a13618d4ec8f026a35dbdf845e1b99d6283393d56fd2bb7f90377e5a78b01a4b390dd150"}]}, 0x175c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000000c0)={0x29, 0x6, 0x0, {0x5, 0x5}}, 0x29) 13:46:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = dup(r0) write$apparmor_current(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="6368616e676570726f6606000000000000002f70746d7800dbff2299b7e56803b748af2333ff70dc7ea0fac7c3c4ff169d052d124f403e10e03ac876a2faeb9d52dbe7bcd2c765c873c30b16c0dc1e264a6e95276f87c55c28a4cbbee14abaf4325cbac29f92a71aa433ec677eb7b418d9ec4c402fe122c398732922e0ed26184307116055f9d1f17d5ed597a6e0da61423737a9112aab93c950f016301b435347bf0ca8533122da0182b43b795def5259695e041912bbe5c6f1c90085c80763647ca0e947099e67ecd1a316b77d993d1a6f"], 0x18) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x462, 0x0, 0x8, {0x100000000800}}, 0x18) 13:46:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000)=ANY=[@ANYRES16=r1], 0x2) r2 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x95, 0x20000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1021500}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)={0xfffffffffffffc93, r3, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9bf}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x38}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffffff11}]}, @TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdb5c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb409}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2a3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffbff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x800}, 0x8010) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40000, 0x0) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000000100)=""/139) 13:46:41 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80184132, &(0x7f0000000000)) 13:46:41 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:46:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0xfffffffffffffffc) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000040)) 13:46:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote, 0x0, 0xff}, 0x0, @in=@multicast2}}, 0xe8) 13:46:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) r2 = dup(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000100)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) 13:46:41 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8) [ 224.154528] binder: 11038:11039 Acquire 1 refcount change on invalid ref 0 ret -22 [ 224.179416] binder: 11038:11039 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 13:46:42 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}], 0x1, 0x0) ioctl(r0, 0x5452, &(0x7f0000000000)) 13:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x8) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x200000) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) renameat(r1, &(0x7f0000000000)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a45352, &(0x7f00000000c0)={{0x9, 0x100000000}, 'port0\x00', 0x40, 0x50004, 0x401, 0x0, 0x6, 0x8, 0x6, 0x0, 0x2, 0x25b5}) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:42 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7, 0x4000) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f00000000c0)=0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) [ 224.213956] binder: 11038:11039 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 224.268790] binder: 11038:11056 Acquire 1 refcount change on invalid ref 0 ret -22 [ 224.310671] binder: 11038:11039 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 13:46:42 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80984120, &(0x7f0000000000)) 13:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x2, 0x2) write$UHID_CREATE(r1, &(0x7f00000001c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000000c0)=""/227, 0xe3, 0x8, 0x1, 0xdbf, 0x0, 0x1f}, 0x11c) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000340), &(0x7f00000005c0)=0xffffffffffffff84) r2 = getpgrp(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x5, 0x7, 0x8, 0x8, 'syz1\x00', 0x2}, 0x3, 0x200, 0x0, r2, 0x4, 0xfffffffffffffffd, 'syz1\x00', &(0x7f0000000040)=['\x00', 'syz0\x00', '/dev/radio#\x00', '\x00'], 0x13, [], [0xceb2, 0x5, 0x1, 0x8]}) ioctl$TCFLSH(r0, 0x540b, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x102, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000500)={0x1, 0x5, 0x7, 'queue1\x00', 0x1}) 13:46:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x7f}, 0x1c) r2 = dup2(r0, r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="810567fd816c9dbd94a01851eaff56e2333a3209"], 0x4) sendfile(r1, r1, 0x0, 0x8) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @thr={&(0x7f00000000c0)="3687521e24f402db2f10ffa46ac3bf6897aaaf315fc972346a000c571ddfe3596527d0b3010cb6488e6896819948c34c0891aae2f0e1be64008fbe72ea7b8f0c9f311a943db2cfaf269c6cc3ed66db08b51d10ac681880e58a5068ca39e5030231ca7b4f4963079c4cb3afeac88b37a3ffe780233e955ba177b7d87f0b79ab8c63e938be8b421e7c204b30b9a91a4736bc232bca3038d2aea0cbbb62de29a1", &(0x7f0000000180)="30d2074ce69ad87506148963239f1c48947986db206937afb533ce2856738d12f7f0b37696ea41f13278b31d1f7a62b25554d40c8254d385f70b7c6a1ed452367e4c358bc36fb41fa0b8814a243e1948a5e8e4a5cf2b887b2ce410cd72606e7dcbfb4ce7f22b7993fabe2ae97887b7f2d3f2a3ad0cc1d232d38165e6586e90c274677ffd407886"}}, &(0x7f0000000240)=0x0) timer_getoverrun(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='comm\x00') connect$vsock_stream(r3, &(0x7f0000000300)={0x28, 0x0, 0x2710, @reserved}, 0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000340)={0x0, 0x6}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000003c0)={r4, 0x52, "fbf4e6e77bc88d81e22af5a23acb9bcada6184ad99ae022fad2b3bc88a8437b0e6f3e80bdff2a8815961d9f0c1899eb2c94556c2f4d49d3f4a56058f5cc7352e2521fdf21791581e364b75cb8dc0d63e6ea9"}, &(0x7f0000000440)=0x5a) 13:46:42 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc2604111, &(0x7f0000000000)) 13:46:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0, 0x2480}, {r0, 0x400}, {r0}, {r0}, {r0, 0x300}], 0x5, 0x10001) 13:46:42 executing program 0: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) clock_gettime(0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 13:46:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f00000000c0)={@local, @loopback}, &(0x7f0000000100)=0x8) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4040) sendmsg$rds(r1, &(0x7f00000007c0)={&(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/189, 0xbd}, {&(0x7f0000000240)=""/70, 0x46}], 0x2, &(0x7f0000000600)=[@zcopy_cookie={0x10, 0x114, 0xc, 0xffffffff00000001}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000300)=""/71, 0x47}, &(0x7f0000000380), 0x8}}, @rdma_dest={0x18, 0x114, 0x2, {0x5, 0x7ff}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfff, 0x1f}, &(0x7f00000003c0)=0x4, &(0x7f0000000400)=0x3, 0x2, 0x6, 0xfffffffffffffffb, 0x67, 0x40, 0x9}}, @cswp={0x58, 0x114, 0x7, {{0x4, 0x7e7bbd6}, &(0x7f0000000440)=0x400, &(0x7f0000000480)=0x1, 0x8001, 0x401, 0x2, 0x5, 0x12, 0xfffffffffffffff9}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000004c0)=""/126, 0x7e}, &(0x7f0000000540)}}, @cswp={0x58, 0x114, 0x7, {{0x2, 0x4}, &(0x7f0000000580)=0x5, &(0x7f00000005c0)=0x4, 0x7, 0x2, 0x1000, 0xb69, 0x2, 0x1}}], 0x190, 0x20000001}, 0x20044004) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="333a32095a6344d25a8911f6a1cc990bb2924928a01e2159e715d354a4767ce22189d05896680bdd0999a994fe22f877a0547b6d307a26c25c681fb11e43a9381c32450bb588c430d76f3e6c2811060c0fedc5f0a1240751cc9e18cbe892f0056eb27bdd"], 0x4) sendfile(r2, r2, 0x0, 0x8) 13:46:42 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:42 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000100)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30}, 0x30) 13:46:42 executing program 4: keyctl$join(0x1, &(0x7f0000000340)={'syz', 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/tcp6\x00') ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f00000003c0)=0x1) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0xec31, 0x100, 0x1, 0xd3f, 0x0, 0x7fffffff, 0xe58, {0x0, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x1b}, 0x7}}, 0x10001, 0x9, 0x8, 0x6, 0x8}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000001c0)={r3, 0x91, "5cd7bb9b7f4ebba920d62a203a0876d0155b8d1ee105c60be10c3978b00cb58104211ccbb2f14f41c637a532495fa4ecb5a9e5c20417275fb79c17a458ab299b0838bc8cb27ebbebffb8f95f7241c5d98e0aff09fe524a03bc8939f2614206a74b0957d57e4228f2995ab9af783e09229b19b11faf4b52bca24694226967cd57ae256dd9cdd6bb0263c8ce47ecca43d7b9"}, &(0x7f0000000280)=0x99) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000380)={0x1e, 0x1b, 0x5, 0x5, 0x5, 0x4, 0x4, 0xb0}) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000002c0)={0x47, "e1ff4a725ef19792910df01ddcc0eac5f25a270ac45c43bdbc28a3c777abf949c1f235d43ba403c77b9be159e22aa2e15aed5c440d0af7dd946b2b7cd5ed1629074f2674fd72eb"}) 13:46:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x400) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc00c64b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}) 13:46:42 executing program 1: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(r1, &(0x7f0000000140)=0x8000, r0, 0x0, 0x2, 0x0) 13:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000180)=0xe8) setfsuid(r1) r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x4, 0x8802) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0xd8}}, 0x10) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000200)) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xffffffffffffffff) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:43 executing program 1: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x2, 0x0) 13:46:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x30000000000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200)={r3, 0xff, 0x20}, &(0x7f0000000240)=0xc) write$cgroup_int(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="333a320919c4694a497bdf27b1d1fe8c4c6991fef9cde38d3217e1f3e1bc64cad7eb8731cd8000000053df46676a4e62f102c2a0dbf7baba45219a3815ee85d9af064025c5d5576b121b2c7f54170a9191eea2ec9eae182946e4a13f91c2b2f640e800f9acda61531183f2475a9ed7052e9604000000632570f4010afe95090e24aad806da3fe349a5f5c0230d9e"], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = creat(&(0x7f0000000300)='.\x00', 0x100) ioctl$sock_proto_private(r1, 0x89e4, &(0x7f0000000340)="41fe37696df3cd4fb7b49cbcfb4d8bc82498c09124a95573676a5d9b948f4915664f25868920acc16f02f494ecee692ced2520aed8b1") 13:46:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000008c0)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x3}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="17", 0x1, 0x8081, 0x0, 0x0) poll(&(0x7f0000000000)=[{r0, 0x1}], 0x1, 0x200) close(r0) 13:46:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000100)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 13:46:43 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x8000003) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x3, 0x30}, &(0x7f0000000180)=0xc) 13:46:43 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) write$sndseq(r0, &(0x7f0000000100)=[{0xffffffff, 0x5, 0x3, 0xe1, @tick=0x3, {0x1, 0x2000000000000}, {0x7, 0x2}, @control={0x6}}, {0x8, 0x5, 0x80, 0x5, @tick=0x1, {0x8001, 0xae76}, {0x4}, @raw8={"873a34e4380e4cfbf0f91a12"}}, {0x9, 0x5, 0x7, 0xff, @time, {0x89, 0x80}, {0xe2, 0x9b}, @addr={0x196, 0x5}}, {0x100, 0x8299, 0x1ff, 0xc58c, @tick=0x3, {0x200, 0x7}, {0x793, 0x81}, @control={0xf2a, 0x0, 0x6}}, {0x7, 0x2, 0xff, 0x7, @tick=0x4a8a, {0xe5, 0x1}, {0x2a24, 0x9}, @queue={0x0, {0x800, 0x1}}}], 0x8c) 13:46:43 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0af51f023c123f3188a070") ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x0, 0x5, 0x0, [], 0x0}) 13:46:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x108, 0x4, 0x7f, 0x2d5, 0xbd, 0x9, 0x1d9, 0xf2f}, "2bbc7bf04d747a3b27e1a4e6a82dc459d310092d281a5d37558cd65ea6167a", [[], []]}, 0x23f) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 13:46:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8400, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0xe8040, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x1) 13:46:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESDEC=r0], @ANYRESDEC=r0, @ANYRESHEX, @ANYRESDEC=r0, @ANYRES64=r1, @ANYRES64=r1, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYPTR], @ANYRES16=r0, @ANYRESDEC=r0, @ANYRES64=r1], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYRES16=r0], @ANYBLOB="2ab3c13ccaffd67100e6d3a297d9ecfed5065792bd65c9d9207b8d56d8dec7854c1f8659b4bc07a927d94c6f3bfef7b4dd7f3b32fc4bb6d6459bbf0613e8cf4f08ed0e03f911bdfb29f95efdf548c1237c89fcb51dbb5c8f115fd0a0160e0e83f0230f60c47efed903a3985ce36b531f6372b76b2b53c0b5132049fb87107deb91a965e3cdfa50cb20f462ba9a", @ANYRESOCT=r1, @ANYPTR, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r1, @ANYPTR64, @ANYRES32=r0, @ANYBLOB="e15a97176fb6d2", @ANYRESOCT=r1, @ANYBLOB="5ae4e5cb0cd3facb1d2b1c6511c7f97a83a339f308b243277bc50937426a6ba50052e82904868afc28f59a012cd599bbf78520d88d29d2c5f9c6b56b4b0cc678d1162c06862f8b60b8b0d69b8c75cc1339af0b2bf5ea1db3bdf45d33c708ef424f7f144c60770dcd6fdf4abedee9a5bba68ec82ecdbb01a8e23c8988e340eabf971867ec42d1d43cf45c79adb228e73df35ff52e852c139894f3024225b11ad4a51cd4e2b403d098f57987ae136610cac15a8bfbb302f7277b3186e6f11254a2f800f92d15eb649d065f43209c03180f89e5522ef9df0a69b18de18fbe"], @ANYRESHEX=r0, @ANYRESDEC], @ANYRESOCT, @ANYRESOCT=r0, @ANYBLOB="22b74b8ce405a12b8ae22c59de547d0a878d438c86dec72f9bcea839cf07f8b8a554095addb9e31d326f8bb074e8f6905cdf5530ad1491c5ea9d06df45fbb0ff48e993fa78655150"], 0x82) flock(r0, 0x1) sendfile(r1, r1, 0x0, 0x8) 13:46:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x4, 0x2a, [], 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000100)=""/42}, &(0x7f00000001c0)=0x50) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:44 executing program 1: shmget(0x2, 0x1000, 0x2, &(0x7f0000ffe000/0x1000)=nil) mq_open(&(0x7f0000000000)='.wlan0wlan1*@\x00', 0x0, 0x0, 0x0) socket$isdn(0x22, 0x3, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) 13:46:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x200000000, 0x2) write$FUSE_GETXATTR(r1, &(0x7f0000000100)={0x18}, 0x18) 13:46:44 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f00000000c0)=""/155, &(0x7f00000001c0)=0x9b) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2f000000040000000000000013d29c5a663389a7000000000000000000000000070000000000000000000000000000"], 0x2f) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x2) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x12100, 0x0) nanosleep(&(0x7f0000000480), &(0x7f00000004c0)) sendmsg$unix(r2, &(0x7f0000000200)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0xedf48d50a8d79a44, &(0x7f0000000180)=[{&(0x7f00000002c0)="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", 0x5d}], 0x18d, 0x0, 0x0, 0x10}, 0x5) ioctl$TCFLSH(r0, 0x540b, 0x2) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000440)=0x1, 0x4) 13:46:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) r2 = getpgid(0xffffffffffffffff) ioprio_set$pid(0x1, r2, 0x3) sendfile(r1, r1, 0x0, 0x8) 13:46:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x22000, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xffffffffffffff5c, @rand_addr="7ef85011784ea52e942a695659257ce2", 0xfffffffffffffffe}}, [0x81, 0x1400, 0xff, 0x8, 0x7, 0x1, 0x3, 0x6, 0x3, 0xfff, 0x8, 0x1, 0xf1, 0x9, 0x3f]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={r2, 0x80000001, 0x30, 0x7ff, 0x8000}, &(0x7f0000000240)=0x18) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="11f7ca"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:46:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:44 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0)=0x7, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x1) ftruncate(r0, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) r2 = dup(r1) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x18000, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:46:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:44 executing program 0: 13:46:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f00000000c0)={0xffffffffffffff47, 0xffffffffffffffda, 0x7}, 0x132) r3 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) setsockopt(r1, 0xff, 0x0, &(0x7f0000000100)="0a570c91d7f899fd2c7626bfa7c37eefb0f146a602a8844cdcbd97ca7fde40d1cbd9a3e2d618528ce1beadc7500c3fa5cf5b4c1fd9459c50e95c52e4df7e52994ecee6ce8112340cc7dab9b97bf092b796cc859f3a779264e5a39fa58c846e13fd905e7f705387ad5821c46eed6509403467f1eeac380ed5052caf84ea14b67ce29ac424de13110242489f203247f5afb388495301194b360e276162e7dc106ee996e72986f18ae34c1dc3715601c1bd4316282a95a9be260a2bf600f9527ec1211f50b1a67ddeba366ae8eba971117cfd89cc2c82e86b84af2bcc5afc160d991e088a140c7e133c", 0xe8) write$cgroup_int(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='3zr#'], 0x4) sendfile(r3, r3, 0x0, 0x8) openat$cgroup_int(r1, &(0x7f0000000200)='cpuset.cpus\x00', 0x2, 0x0) 13:46:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x80000000, 0x200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, 0xffffffffffffff9c}) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x103ff, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000140)={r2, 0x0, r4}) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000ff7f000000000000000000000200000000000000e0ffffffffffffff000000000000000000000000000000000000000000000000000000000000000001040000e7f500000100000000000000b75800000000000002000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000033f418ca268ccd4d8ecb450000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) 13:46:45 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:45 executing program 0: 13:46:45 executing program 4: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) waitid(0x3, r0, 0x0, 0x80000000, &(0x7f00000000c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000140)={0x800, 0x4, 0x7fffffff, 0x2, 0x18, 0x9, 0x3, 0x40, 0x2, 0x7ff}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:46:45 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000000)) 13:46:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x80000000, 0x3, 0xf78b, 0x1f}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) write$binfmt_script(r1, &(0x7f0000000280)={'#! ', './file0', [{0x20, '^proc'}], 0xa, "60b4facf6871312b8e3bde"}, 0x1c) ioctl$TCFLSH(r0, 0x540b, 0x2) r2 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in={0x2, 0x4e24, @remote}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x1, {0x9e, 0x80, "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", 0x15, 0x2, 0x4, 0x0, 0x1f, 0x0, 0x10001, 0x1}, r3}}, 0x128) 13:46:45 executing program 0: 13:46:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 227.656892] cgroup: fork rejected by pids controller in /syz2 13:46:45 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:46:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x80, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:45 executing program 0: 13:46:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:45 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:45 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000180)={0x20, 0x0, 0x1, 0x9}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40086437, &(0x7f00000001c0)={r1, 0x1}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r3, r3, 0x0, 0x8) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0086426, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}]}) 13:46:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8000, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1a00c020}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_getroute={0x1c, 0x1a, 0x2, 0x70bd2d, 0x25dfdbff, {0x2, 0xb0, 0x14, 0x4, 0xfe, 0x7, 0xff, 0x1, 0x900}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x41) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:45 executing program 0: 13:46:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1080a000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf0, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xd, 0x8}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="0dcad029b714c4fbd609609672dfcd08"}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x15b5}]}, 0xf0}, 0x1, 0x0, 0x0, 0x20000010}, 0x10) 13:46:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$KDMKTONE(r0, 0x4b30, 0x3) 13:46:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:46 executing program 0: 13:46:46 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x90280, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008b80)=[{{&(0x7f0000006f80)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000007200)=[{&(0x7f0000007000)=""/100, 0x64}, {0xffffffffffffffff}, {&(0x7f0000007080)=""/37, 0x25}, {&(0x7f00000070c0)=""/182, 0xb6}, {&(0x7f0000007180)=""/119, 0x77}], 0x5, &(0x7f0000007240)=""/143, 0x8f}, 0x3dac}, {{&(0x7f0000007300)=@isdn, 0x80, &(0x7f0000007540)=[{&(0x7f0000007380)=""/104, 0x68}, {&(0x7f0000007400)=""/127, 0x7f}, {&(0x7f0000007480)=""/138, 0x8a}], 0x3, &(0x7f0000007580)=""/226, 0xe2}}, {{&(0x7f0000007680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000008ac0)=[{&(0x7f0000007700)=""/49, 0x31}, {&(0x7f0000007740)=""/2, 0x2}, {&(0x7f0000007780)=""/39, 0x27}, {&(0x7f00000077c0)=""/203, 0xcb}, {&(0x7f00000078c0)=""/4096, 0x1000}, {&(0x7f00000088c0)=""/206, 0xce}, {&(0x7f00000089c0)=""/142, 0x8e}, {&(0x7f0000008a80)=""/56, 0x38}], 0x8, &(0x7f0000008b00)=""/101, 0x65}}], 0x3, 0x40, &(0x7f0000008c00)={0x0, 0x989680}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000008c40)={@local, 0x26, r2}) write$cgroup_int(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r0, r0, 0x0, 0x8) 13:46:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:46 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:46 executing program 0: 13:46:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x10000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000340)={@initdev, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000003c0)={@empty, 0x9, r2}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)=0x7f, 0x4) getsockopt$inet6_dccp_int(r3, 0x21, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000080)={0x1}, 0x8) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) 13:46:46 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:46 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x408600, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0)={0x0, 0x0, 0x0}, &(0x7f0000002700)=0xc) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000002740)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pipe(&(0x7f0000002780)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000027c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000002800)=0x1c, 0x80800) r7 = socket$can_raw(0x1d, 0x3, 0x1) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000002840)='/dev/rtc0\x00', 0x10040, 0x0) r9 = dup(0xffffffffffffffff) r10 = syz_open_dev$vivid(&(0x7f0000002880)='/dev/video#\x00', 0x0, 0x2) r11 = socket$pptp(0x18, 0x1, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002900)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000028c0)='/dev/ptmx\x00'}, 0x30) r13 = signalfd4(0xffffffffffffffff, &(0x7f0000002940)={0xf4}, 0x8, 0x80000) r14 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000002980)='/dev/video36\x00', 0x2, 0x0) r15 = syz_open_dev$vcsa(&(0x7f00000029c0)='/dev/vcsa#\x00', 0x0, 0x2000) r16 = socket$alg(0x26, 0x5, 0x0) r17 = getpgid(0xffffffffffffffff) lstat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000003b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002e00)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002e40)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)=0x0) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000003900)={0x0, 0x0, 0x0}, &(0x7f0000003940)=0x8) r26 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003180)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000003280)=0xe8) lstat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000033c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000003380)='/dev/ptmx\x00', 0xffffffffffffffff}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, 0x0, 0x0, 0x0}) r31 = getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003740)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003780)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000003880)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r35 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000039c0)=[{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000025c0)=[{&(0x7f0000000140)="6e55949f1b1de7b093ce29b1fc313b0b46e2ecf1f3c56547310c26ef7443753a620be31e473b747d2891bfb37dd1d25863a6c9e9e66ef23b23929a46f6c6eb7d452da4b6a520a950bbde6f316ea89b70728fa7039a233cdf727b4c083da061a675775db710103d832ea0c404808db5f3129e02c0df42e589ec7a2696a633fd46becd22187d88d120f9a5e1f268747c5d50d91573d6275c779e390cfcd96d00e72ca4baaeb8b70cbf83a0a34603ffeca618a421fe2103824f3b658dbdc219f2cce6e7", 0xc2}, {&(0x7f0000000240)="dd295808a8a2b52874ccbb0b0c6319756f9474103a1c98d5a3a0daa82deb82bf9dc58365b6e3c2273bd6eaa1ad7604a545af637d01c0c51143bcc2061b7d06959f76562a9eecc119fc7116f12f024b51d426bba84c4151d410654b60c0f4a6b9d81405c8d8da8dfe517a9fc64b7495ade0e05082f3199cfd010745b35adacdf9d1153d0f39871bdd17ce706ac18b579dd8439f66d3d07c67a8fc6ebd8a03bb54099d0fd6caf9fdace621ac1bb4580341f6f6da446d0f9133585c61fb3f1e5875", 0xc0}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="289364531316512c8cbe757cdda642da6bb33f91f62466cf87edf2486f4ac5b434c46c361240f232b2e4d1ba3d035bc8c387bddce3375c88464cd637e7a2f41a093e59afeb55c4b027b7daa0c74d97d811b421401667dbedc20f6c58fca54bf38cd49a625407ac57d8a10d411d9c8c1984fe8679225c4528564d5e85b56c9dec830dc870a05b6666964837885a06b259068cba9cc6c570ed52ea9b1ab27aae000b3bca9e6f6454c292f185168e987391a5767fb4a83d1c103fe7e8fb4474ca5c612632029593dea53ed1488ff57a6704c7c0ccf07539333dab07e166781aec3853638f97e05d8136ef9d5c83ba53a8b8b0311f43", 0xf4}, {&(0x7f0000001400)="36bf9e", 0x3}, {&(0x7f0000001440)="484c3af5800907913ee0cfe4d91705519a82e8ec2af79eff44d81c4197caa19c65f9222fcc1d9a7fe66dfb60d3371ed67a4fa73115f2aa903b124ac87e61a89656d8974303e66ec2d01cdb2b731055bc36326de107775b27e4ee14a8d20d46bf56916dadab69b8ab5f17fc0c8b22243c7e674de1ad567a730ca99a8a4e267fef530312844c3e4a4e34b2f7adcef1a0bb070499369477fcb31a0d1c7fb36dbabd68e5be5a4e894b1dd93867a7394f708e3454a20e2a60f3376f99c91298", 0xbd}, {&(0x7f0000001500)="f31853f80519b2542239f0454f845545ac9ad33cb766a83640f5d4b9b2e0471f19048cf6b9940b79419869259fcc1bcec5cf54d4009444ffe2b9f85f9f0f9699d9a3145b6f8252aea67056a2ae74d570189de7c8462559e50a0d8da28dabd604192b9fb851ad747f74c4c6b3f6637abcf8630280519a57324d50e96886a207c2a56b55d00d20f3d0c2ebac9c7435fe7df5826fd772711c9349ab4aedfc05280cd12a5a01455a8b7178107bd21e4febec0130fd21ed3d5fdd112f9f", 0xbb}, {&(0x7f00000015c0)="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", 0x1000}], 0x8, &(0x7f0000002a00)=[@cred={0x18, 0x1, 0x2, r1, r2, r3}, @rights={0x1c, 0x1, 0x1, [r4, r5, r6, r7]}, @rights={0x18, 0x1, 0x1, [r8, r9, r10]}, @rights={0x24, 0x1, 0x1, [r11, r12, r13, r14, r15, r16]}], 0x70, 0x10}, {&(0x7f0000002a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002c80)=[{&(0x7f0000002b00)="4cff931141fc97f02abe5d4a99b92255ee7b5ddb47edf93b64b1e9943f85907f85b1165bb88fe52b0abf758815c4cebd62852d21e3ef68f64be89d5a91adfe5b34cd6d7bd8ee1fe3f9716cf7cb07608f3c9a23466729c1e79a79b215a71f2ea21d68960842ad7db023953296573f4c36fb5f7cdd30fbfe1d5afd13cab37de81af8a34a4c50969a219f8023fa6edfd7267296c0a018aca51195fe09a129276df0ca88c52c4468217df4c13fd3e0f8b8eae6a3e8e96d12523840829e6b6eb72dfc00c8024f56b4a282c22a02007c38ff265f05", 0xd2}, {&(0x7f0000002c00)="5e077fbf2e2df4bb90a1e06ce37020f7a64b4a86b60d9d6aa520f5ce36", 0x1d}, {&(0x7f0000002c40)}], 0x3, &(0x7f0000003480)=[@cred={0x18, 0x1, 0x2, r17, r18, r19}, @cred={0x18, 0x1, 0x2, r20, r21, r22}, @cred={0x18, 0x1, 0x2, r23, r24, r25}, @cred={0x18, 0x1, 0x2, r26, r27, r28}, @cred={0x18, 0x1, 0x2, r29, r30, r31}], 0x78, 0x4c800}, {&(0x7f0000003500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003600)=[{&(0x7f0000003580)="dc5bfc9c714ee6e006fc98691333ba35e2a5960a15c590175b4ffc6034d971f1bf4ee105e888af52a795724dfd065a21be0fc30bd79ee44c5d110dca6988c9e281fa2a6d4480f15ce5", 0x49}], 0x1, 0x0, 0x0, 0x4000}, {&(0x7f0000003640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003700)=[{&(0x7f00000036c0)="6679bf8d6af93ef33f9e81e1a145cd821861c220c6b0bbdc51d555854703adc8792f63b007fec1f4db", 0x29}], 0x1, &(0x7f0000003a40)=ANY=[@ANYBLOB="df402a9c3a86f353a11800000001000000020000009b6394648b209cc2c960e9d418eaa5a5237877f4ea203a168988f8c31e8cf72057c2fded09076c985ccf395982000000000000", @ANYRES32=r32, @ANYRES32=r33, @ANYRES32=r34, @ANYBLOB="10000000010000000100ea006fc03d358281845dedbd7740dc03eba64d9f8623e425962888eef3f47e0e05b7cc30d7f3adbca45424ac3aea866ff37b2fe0e8072420fa92806ec2a9c2afb8ffe6d85ec826ead88cbaf55934", @ANYRES32=r35], 0x28, 0x80}], 0x4, 0x800) r36 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TIOCSETD(r36, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r36, 0x540b, 0x2) 13:46:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:46 executing program 0: 13:46:46 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:46 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:46 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:46 executing program 0: 13:46:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) fdatasync(r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2204, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:46 executing program 0: 13:46:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2000201, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x8, 0x800, 0xba4, 0x0, 0x1, 0x9, 0x4e4, 0x0, 0xbe6a, 0xfffffffffffffffd, 0x9, 0xfffffffffffffffa}) 13:46:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) 13:46:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="331a3209"], 0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:46 executing program 0: 13:46:46 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x8, 0x30c8, 0x1f, 0x80000000}]}, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x10000, 0x100000001}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:47 executing program 0: 13:46:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa4002, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000240)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e23, 0x833, @mcast2, 0x7}}}, 0x84) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0xd4, 0x4, 0xfff, "e772801e51080f28059613b0bcade9d0", "9524630d5e28e2abc9d69e92f761b6e2a58a281a96f3b2404c5827f76fc6b50e19639a3e771a3f6511a4d4fc36ebc05dd50ea2d61bc02bb7a5411cae0e45b79c3059f23aea864fbddd4e864842c5371d3c2fe75f3fd3478fdcee8e30e125ee6908be9b2b1c401db729c3b8e57e2c903a10a07c400101f2ae9a3c0a13caf0e280491c95d3c6ae6bf9d1c8d4179564b3f37905514b636292db610358a2bd79fe1a97cb1c86fda024ff0d78586cf9b47d37d81d604b91b5d4dcd869abbfb93c77"}, 0xd4, 0x1) 13:46:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:47 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x102102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@known='security.selinux\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 13:46:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10040, 0x2) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000000c0)={0x9, 0xfffffffffffffffb}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x41000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x200, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", ""]}, 0x24}}, 0x20008090) ioctl$TCFLSH(r0, 0x540b, 0x6) 13:46:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:47 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x40000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x40000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xe) ioctl$TCFLSH(r1, 0x540b, 0x6) 13:46:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f00000000c0)=0x1, 0x4) 13:46:47 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000004780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.system.Security\x00', 0x0, 0x0) 13:46:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:47 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0x8, 0x7, 0x81, 0x7]}, &(0x7f0000000100)=0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000740)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @loopback}, &(0x7f0000000840)=0xc) r8 = accept4$packet(r0, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast2, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000a40)={@broadcast, @rand_addr, 0x0}, &(0x7f0000000a80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'veth0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c40)={'ip_vti0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000cc0)=0x14) getsockname$packet(r8, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0xfffffffffffffeb6) getpeername$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000ec0)=0x14) getpeername$packet(r0, &(0x7f0000000f00)={0x11, 0x0, 0x0}, &(0x7f0000000f40)=0x14) getpeername$packet(r0, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000fc0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001000)={'\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000001040)={@empty, 0x0}, &(0x7f0000001080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f00000011c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001200)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000014c0)=0xe8) getsockname$packet(r0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001640)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000001740)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001780)={'bpq0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f00000018c0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001900)={0x0, @multicast2, @empty}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001980)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001a80)=0xe8) accept4$packet(r0, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001bc0)=0x14, 0x80000) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000002540)={@remote, 0x0}, &(0x7f0000002580)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000030c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000003080)={&(0x7f00000025c0)={0xa90, r2, 0x301, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xcc, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r12}, {0x16c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r13}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0xba, 0x4, 0xb5b, 0x3ff}, {0x800, 0x28e0, 0x20, 0x1}, {0x3ff, 0x51bf9bea, 0x69d, 0xfffffffffffffff8}, {0x9, 0x60000, 0x0, 0x6}, {0x3f, 0xbe3, 0x8, 0x9}, {0x8001, 0x6, 0x20, 0x9}, {0x9, 0x1f, 0xfff, 0x5}, {0x0, 0x1, 0x8, 0x5}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r18}, {0x1e8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x10001}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r22}, {0x258, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r25}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r29}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}]}}, {{0x8, 0x1, r31}, {0x168, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xa1e72b7}}, {0x8, 0x6, r32}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff7}}, {0x8, 0x6, r33}}}]}}]}, 0xa90}, 0x1, 0x0, 0x0, 0x4081}, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x18) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:46:47 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) 13:46:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='.\xa94\xe8\x1cA\x16\x9fw\x15OP\x89\xdf\xa1\x9c\xc7\x1e\'w0\x1f\x1dp\xe7\xcd\x9dg\xec\x96C\xd5WD\x13\x82sA\f\xba\x84\xfd\xaa\x1f\xb3\x9d\xf8\xedq\xc8E\xb1*\xff\x0e\x88\x9f\xaf\x16\xdcO\n5\xf7\xcd\xe5\x9aB\ahQn.\xb0B\x06\x0e\v1o\x88\x15\x8fV%\xe7\xfca\x8cyX\xf4e$am\xc5~\xc6\x15\x8a\x84M\x8f\x9b%\xf4\xb31t\x01#>\x97\xb9\x84\x95\x92\xed&\x93\xe1\xf9\x9edW{\xbe\xbd\xb8-8g\xba\xd8\xc5\x8dRhx\xe6\xab\xafN\xd9&|mf\xf4\xd9Ci\x01\x81mIa', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="33f5167bfafae7b6ad3a3209"], 0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000040)) sendfile(r1, r1, 0x0, 0x8) 13:46:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = fcntl$dupfd(r0, 0x406, r0) setns(r1, 0xe020000) ioctl$TCFLSH(r0, 0x540b, 0x200) request_key(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='/dev/ptmx\x00', 0xfffffffffffffff8) 13:46:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="411532be"], 0x4) sendfile(r1, r1, 0x0, 0x8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x42202, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000100)={0xfffffffffffffff9}) 13:46:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x40, 0x10000) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$TCFLSH(r0, 0x540b, 0x2) open$dir(&(0x7f00000000c0)='./file0\x00', 0x208000, 0x22) [ 232.075134] IPVS: ftp: loaded support on port[0] = 21 [ 232.140258] chnl_net:caif_netlink_parms(): no params data found [ 232.169548] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.175983] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.183926] device bridge_slave_0 entered promiscuous mode [ 232.191483] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.197860] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.204925] device bridge_slave_1 entered promiscuous mode [ 232.220233] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.229179] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.247675] team0: Port device team_slave_0 added [ 232.254673] team0: Port device team_slave_1 added [ 232.311666] device hsr_slave_0 entered promiscuous mode [ 232.378663] device hsr_slave_1 entered promiscuous mode [ 232.441038] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.447978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.455082] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.461480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.494585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.505298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.513233] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.520739] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.528185] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 232.538817] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.547892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.555615] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.562001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.571997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.579920] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.586253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.607059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.614835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.629056] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 232.638993] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 232.649986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.657077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.665040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.672668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.689659] 8021q: adding VLAN 0 to HW filter on device batadv0 13:46:51 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0xf, &(0x7f00000000c0)="456d9a873411421c3f2fb762a6553721759737c28cbee5583cec1018c51dcb91cc064329b04eb7e0736aaa0f1e1200ca4d097e0f0d696b2fb3d9df6b07a6709fcae06e603d0cd25a6238a898816ba1131c267392787fa842823e01e9b3af1d3d261ebc0fbce7fdfc41393ea4309e2a75a014925253061694643f3c65c3e66445ddfceeabba21fc67730eb15b7528047659416f54ec7562ef6ecec3c63c82ec1555cde3598871eb78cb428d3dbf6fc0299d560d4cf802b58538d9132dcc5d17e3b338c039ff9da318832174ee9a3ef0d5fd", 0xd1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x10, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@subj_type={'subj_type', 0x3d, 'vboxnet0bdev/vmnet1wlan0'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x35, 0x62, 0x34, 0x63, 0x38, 0x38, 0x37], 0x2d, [0x30, 0x63, 0x33, 0x30], 0x2d, [0x31, 0x61, 0x33, 0x37], 0x2d, [0x30, 0x30, 0x39, 0x61], 0x2d, [0x66, 0x33, 0x77, 0x39, 0x77, 0x38, 0x31, 0x65]}}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsname={'fsname', 0x3d, '&'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@subj_type={'subj_type', 0x3d, 'md5sumself'}}]}}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x80, 0x0) read$FUSE(r1, &(0x7f0000000580), 0x1000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) 13:46:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:51 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000100)={0x1, 0x0, {0xcf9, 0x5, 0x136, 0x101}}) sendfile(r2, r2, 0x0, 0x8) 13:46:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400000, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000040)) 13:46:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, &(0x7f0000000080)) socket$xdp(0x2c, 0x3, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x0, @multicast2}}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x13f) unshare(0x40000000) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e21, 0x0, @mcast2, 0x9}, {0xa, 0x4e24, 0x5, @dev}, 0x562320c7, [0x5, 0x3, 0x0, 0x0, 0x0, 0x8, 0x80, 0x8]}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000001c0)={0x0, 0x4}) 13:46:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x800, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x800) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 13:46:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x8) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="0f7e"], 0x4) sendfile(r1, r1, 0x0, 0x8) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x400080) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000000c0)=""/254) 13:46:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io\x02\x00\x00\x00\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) [ 233.879621] IPVS: ftp: loaded support on port[0] = 21 [ 234.188241] IPVS: ftp: loaded support on port[0] = 21 13:46:52 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x5) ioctl$TCFLSH(r0, 0x540b, 0xfffffffffffffffc) 13:46:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x6402, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="10000120"], 0x4) sendfile(r1, r1, 0x0, 0x8) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1f, 0x40000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) 13:46:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, &(0x7f0000000080)) socket$xdp(0x2c, 0x3, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x0, @multicast2}}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x13f) unshare(0x40000000) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e21, 0x0, @mcast2, 0x9}, {0xa, 0x4e24, 0x5, @dev}, 0x562320c7, [0x5, 0x3, 0x0, 0x0, 0x0, 0x8, 0x80, 0x8]}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000001c0)={0x0, 0x4}) 13:46:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 13:46:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x24000, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000001c0)={0x8000, 0x5, 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) recvfrom$inet6(r1, &(0x7f0000000240)=""/93, 0x5d, 0x40000001, &(0x7f0000000140)={0xa, 0x4e23, 0x80000000, @ipv4={[], [], @loopback}, 0xfff}, 0x1c) openat$capi20(0xffffffffffffff9c, &(0x7f0000000200)='/dev/capi20\x00', 0x4002, 0x0) 13:46:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x400) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101280, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x3) 13:46:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) [ 234.831489] IPVS: ftp: loaded support on port[0] = 21 13:46:53 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x200000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) fstat(r0, &(0x7f00000000c0)) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) mount(&(0x7f0000000100)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='nfs4\x00', 0x29, &(0x7f0000000200)='selinux@vmnet1(eth0%em0\x00') r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="8ca59e5875460a454d76fbd232b42ec18c6f74032733438bd129508aa7b0"], 0xfffffffffffffe5a) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0x33) getresuid(&(0x7f00000000c0), &(0x7f0000000240)=0x0, &(0x7f0000000280)) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@remote, @in6=@dev={0xfe, 0x80, [], 0x29}, 0x4e20, 0x26c3, 0x4e24, 0x6, 0xa, 0xa0, 0x0, 0x27, r3, r4}, {0x20, 0x8, 0x2, 0x8, 0x1f, 0x2, 0x3f, 0x200}, {0x7f, 0x3f, 0x3f, 0xd8}, 0x3, 0x6e6bc0, 0x2, 0x0, 0x2, 0x2}, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, 0x4d3, 0xff}, 0xa, @in=@empty, 0x0, 0x1, 0x2, 0x567, 0x1f, 0x75c, 0x2}}, 0xe8) sendfile(r1, r1, 0x0, 0x8) 13:46:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) timer_create(0x4, &(0x7f0000000180)={0x0, 0x26, 0x2, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_settime(r2, 0x1, &(0x7f0000000200)={{0x77359400}, {0x77359400}}, &(0x7f0000000240)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40046432, &(0x7f0000000140)=0x1) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000100)={'teql0\x00\x00\x1f\x00', {0x2, 0x4e23}}) 13:46:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x7f, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100010}, 0xc, &(0x7f00000004c0)={&(0x7f0000000100)={0x384, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x12c, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff0000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x432eb8e3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa144}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6dba}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xec, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @mcast2, 0x3}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfffffffffffffe00, @remote, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @local, 0x80000001}}}}]}, @TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x65f3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x300}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xec40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xe9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x81}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffffffff}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x4}]}, 0x384}, 0x1, 0x0, 0x0, 0x4040001}, 0x800) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) sendfile(r1, r0, &(0x7f0000000540), 0x4) 13:46:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, &(0x7f0000000080)) socket$xdp(0x2c, 0x3, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x0, @multicast2}}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x13f) unshare(0x40000000) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e21, 0x0, @mcast2, 0x9}, {0xa, 0x4e24, 0x5, @dev}, 0x562320c7, [0x5, 0x3, 0x0, 0x0, 0x0, 0x8, 0x80, 0x8]}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000001c0)={0x0, 0x4}) 13:46:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x800000000a) ioctl$TCFLSH(r0, 0x540b, 0x2) socket$key(0xf, 0x3, 0x2) syz_open_pts(r0, 0x0) [ 235.803385] IPVS: ftp: loaded support on port[0] = 21 13:46:53 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:53 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000000c0)={0x40, 0x2, {0xffffffffffffffff, 0x3, 0x3, 0x1, 0x3}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x10000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:46:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000088}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r3, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffff20c4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f42219a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40010}, 0x14) sendfile(r1, r1, 0x0, 0x8) 13:46:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x91) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, &(0x7f0000000080)) socket$xdp(0x2c, 0x3, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x0, @multicast2}}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x13f) unshare(0x40000000) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e21, 0x0, @mcast2, 0x9}, {0xa, 0x4e24, 0x5, @dev}, 0x562320c7, [0x5, 0x3, 0x0, 0x0, 0x0, 0x8, 0x80, 0x8]}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000001c0)={0x0, 0x4}) 13:46:54 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000400)='/dev/amidi#\x00', 0x7f, 0x8001) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000440)=0xffff) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x12000, 0x0) r2 = dup(r1) r3 = msgget$private(0x0, 0x20) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000480)=""/4096) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)={0x1f, 0x401, 0x713b, 0x8}) recvfrom$unix(r0, &(0x7f0000001480)=""/4096, 0x1000, 0x22, &(0x7f0000002480)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x1, @rand_addr=0x3}}, 0x1e) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000300)={0x8, 0x0, [{0x0, 0x90, 0x0, 0x7fffffff, 0x400}, {0x4, 0x2, 0x3f, 0x1, 0x64}, {0xc000001f, 0x5660, 0x5, 0x8, 0x591}, {0xb, 0x2, 0x80000000, 0x79, 0x6}, {0xc0000008, 0x19, 0x3f, 0xb9, 0x9}, {0xa, 0x401, 0x44, 0x7fff, 0x2}, {0x40000001, 0x44, 0x9, 0x10001, 0x85fc}, {0x8000000f, 0x3, 0x3, 0x1, 0x7fff}]}) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x3) r5 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="782466e2d196426ec2f88141ef1993aae68cd3200f878dbbd1e6dac23cd05ef3f3b7b89c5a7a7aa6cade282c1df198296956cffbe3fb80d595fb501de9e21a2bd51a81ffe39d97948ea9c89a12f804e04955cf15a1b14237dcec61f276ae462ac593880db9e98d1cdc1d7102b488dd40699452541793ff56ebed8d86fd609d3cd8936653fd7181de6b6391f9093459ac052f313bc64cb01c1affa78309ab4b4d945be9e9a63f5949", 0xa8, 0xffffffffffffffff) keyctl$read(0xb, r5, &(0x7f0000000280)=""/67, 0x43) ioctl$TCFLSH(r4, 0x540b, 0x2) 13:46:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x80000, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000000000000000000002000000000000000000005ed89815204635ff004681000000000000000000000000000000000000"], 0x48) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r4 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='/dev/ptmx\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="a12c4ed0cb8293f96cc0b0db65112c1a0590df973d61967d39163134b19baf9ce9dca5ac8912f831d829e9a09a90e7c62fec242d236b38dd6b07953da369b1a43610beaefee5f139cdb3cd406359bdf79c3696901f570d15d9c7fd03216500dd678363b1aaca", 0x66, r4) prctl$PR_SET_PDEATHSIG(0x1, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={r5, 0x65fe, 0x6}, &(0x7f0000000180)=0x8) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) 13:46:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000240)=ANY=[@ANYRESOCT], 0xfffffffffffffcbd) r2 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xb512, @remote, 0x2}}, 0x9, 0x3, 0x100000001, 0x6, 0x3}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r3, 0x9}, 0x8) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 13:46:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:54 executing program 4: r0 = gettid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x20, 0x2, 0x10001, 0x0, 0x0, 0x81, 0x1000, 0x8, 0x80000001, 0x7, 0x6, 0x7, 0xb, 0x0, 0x7, 0x0, 0x6, 0x10000, 0x8db, 0x20, 0x3, 0x7f, 0x8, 0x1800000000000, 0x5, 0x5bc3, 0xfffffffff718a6d4, 0x6, 0x401, 0x1, 0x5, 0x7fff, 0x7fff, 0xffffffff, 0x7, 0x5, 0x0, 0x8, 0x6, @perf_config_ext={0x401, 0x3}, 0x401, 0x3, 0x80, 0xb, 0xffff, 0x51daad60, 0x2}, r0, 0x9, 0xffffffffffffffff, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) [ 236.853106] IPVS: ftp: loaded support on port[0] = 21 13:46:54 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) open(&(0x7f0000000040)='./file0\x00', 0x1, 0x2) 13:46:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$midi(0x0, 0x0, 0x82) ioctl$KVM_RUN(r3, 0xae80, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2b, 0x2000000001, 0x0) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffe97) setsockopt$inet_mreqsrc(r4, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r5 = dup(r4) write$P9_RCLUNK(r5, &(0x7f0000000040)={0xfffffffffffffee5, 0x79, 0xe803}, 0xffffffffffffffc4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x5298391e, 0x4}) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) r7 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x3f00, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r8, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) 13:46:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x800) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f00000000c0)={0x2, 0x10000, 0xffffffffffffffff, 0x8, 0x2}) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:55 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528acba}], 0x1, 0x0) 13:46:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = socket(0x11, 0x2, 0x140009) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xffffffff) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x82000004, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYBLOB="c9000000b7e83ea758d897b4a64e84dd17309de547eeef589b298ee0609915a18d2fff66d31d937931e80871ca96a66e7df63729a4493ff412cafd48e5af9838eef7eee56ce5241275edea99b70b3785b187faadbc22d0f048e2350ea8ceefab94705ae1d37a5ae21053f0deab69a50a1de66326f9cf921ad843e02b342c571fd8fce68bafa21aac666be2139f0aca723dfd3543f568ea5725952b4c42e52219eba17cdb6d10735210518eeae6d96274c3b4c6bf61047feec2"], 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe2(&(0x7f0000000000), 0x84000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) modify_ldt$write(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = semget(0x2, 0x200000000004, 0x27) semctl$SEM_INFO(r1, 0x7, 0x13, &(0x7f0000000040)=""/38) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x5) ioctl$VT_RELDISP(r0, 0x5605) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x200080, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r4, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f00000001c0)=ANY=[@ANYBLOB="06000000000000000000000000000000000000000000000000000000000000000000000000000000001e0000f9ffffffffffffff0001000000000000000000000000000000000000000000ec00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b0000000000000000000000002078d3622da49a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000493fe0c65dee1c801316f6c8bd7e4219ab5ded89ad2e2c9d"]) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) 13:46:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = dup(r0) getpeername$tipc(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x7, 0x1}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0xdffb8d5d5b86eba3, 0x1) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x600001, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000440)=0x3) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000080)=0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x78001, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0xffffffff80000001, {{0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x29}, 0xbf2}}, {{0xa, 0x4e20, 0x8, @remote, 0x9}}}, 0x104) socket$netlink(0x10, 0x3, 0x4) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000003c0)) writev(r1, &(0x7f0000000400), 0x31e) ioctl$TCFLSH(r0, 0x540b, 0x5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x200) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000140)=0xffffffff80000000) connect$tipc(r2, &(0x7f0000000380)=@name={0x1e, 0x2, 0x4d8a8ca043790bc, {{0x2}}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video35\x00', 0x2, 0x0) 13:46:55 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:56 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x8000, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='\xcex.max\x00\xe3\xa3\xdd\xf0\x00\xd9\x85;D^\xe7rcx\xbe\xe3\xbdrm\x88\xa7V\xd9~\x85\xe0\x93h I\x11\xad\xe8pH\xa4Y\xc0{\xc5\v\xbb+\xb1\xa6{\xfa\xff3_t\x9d\x0e(\x021}p\xba\xafX\xf4\xd5\x83\x0f\x06\xae]\x90\x86%JX\xe4}5\x96\xce\x98d\xa8\xd4p*\xb6\xad\x9b\xdb\x98\xa2\xa8\xb3\xf7\x9a\x13bs\xada!\x13\xb6\x9c\x7fE\xca~1\xf5\xd4/\x19;\xcd\x13=\xe5\xa8s\xfa\xcdoAj\xdb\xc9\xba\x9cY\x19\x12\xaac\x1f \xec\x1e\xc4is\xb9\x06\x13\x82)S+\xf4\x17\xad\xd0\xe4\xf3\xb5\xcf\xe5\xd7\xf33!\x1c\xb2|\x0eE\x82\xa4\t>^8MC*\b\xc7wn\xe2q#b\"\x03\x04\xcf\x7f\fT%\x8d\xd6\xac%-\x87iF\xb4', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r2, r2, 0x0, 0x8) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffff, 0x2180) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x7f, 0x1, &(0x7f0000000080)=0x4}) 13:46:56 executing program 4: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x18) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/128) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x9) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x6) 13:46:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 13:46:56 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xfffffffffffff001, 0x20000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r2, 0x540b, 0x2) [ 238.664013] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 238.844156] device lo entered promiscuous mode 13:46:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xa430f265b4f10810, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 13:46:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:56 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) 13:46:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000140)={0x8, 0x800, 0x2, 0x7ff, 0x14, 0x80000000, 0x7ff, 0xffffffffffffff51, 0x72c7, 0xffffffff00000000}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) getdents64(r1, &(0x7f0000000180)=""/229, 0xe5) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0xffffffffffffffcc) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:56 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:46:56 executing program 4: lsetxattr$security_evm(&(0x7f0000000440)='./file0\x00', &(0x7f0000000600)='security.evm\x00', &(0x7f0000000640)=@md5={0x1, "418215351f7bac1cbabb486b26f1cb75"}, 0x11, 0x3) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/autofs\x00', 0x100, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000007c0)) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) r3 = dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f00000002c0)={@rand_addr, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000400)={@empty, 0x0}, &(0x7f0000000380)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000740)={&(0x7f0000000840)=ANY=[@ANYPTR, @ANYRESDEC=r4, @ANYRES16=0x0, @ANYRES32=r4, @ANYRES64=r5, @ANYRES32=r5, @ANYBLOB="4400026c40100100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400f7ffffff0800060000000000e485b6a96992e3bb5027dc2d4efc92ddb07283dbf64bd24b7ed8e305da2adb94e48d1cf01c1c95ca331f060000000000000092987be9936a6d29438a9f190a07d27b441c9c", @ANYRES32=r6], 0x8}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f00000006c0)={{0xa, 0x4e24, 0xc702, @empty}, {0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, 0x2, [0x1, 0x2, 0x200, 0x2, 0x4, 0xfffffffffffffffc, 0x7f, 0x1ff]}, 0x5c) openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x802, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000680)) readlinkat(r2, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=""/225, 0xe1) ioctl$TCFLSH(r0, 0x540b, 0x2) sendfile(r2, r3, &(0x7f0000000340), 0x3) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x10001, 0x10001, 0xfffffffffffff7d0, 0x9, 0x8, 0x3, 0x1, 0x1, 0x3, 0x4, 0x3, 0x9}) 13:46:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) 13:46:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fcntl$setlease(r0, 0x400, 0x2) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f00000000c0)=0x4, 0x8) 13:46:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$midi(0x0, 0x0, 0x82) ioctl$KVM_RUN(r3, 0xae80, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2b, 0x2000000001, 0x0) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffe97) setsockopt$inet_mreqsrc(r4, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r5 = dup(r4) write$P9_RCLUNK(r5, &(0x7f0000000040)={0xfffffffffffffee5, 0x79, 0xe803}, 0xffffffffffffffc4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x5298391e, 0x4}) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) r7 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x3f00, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r8, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) 13:46:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xe73, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0xc010) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000100)={'vcan0\x00', 0x62c}) ioctl$TCFLSH(r0, 0x540b, 0x2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x50001, 0x0) setsockopt$inet6_dccp_int(r3, 0x21, 0x1f, &(0x7f00000000c0)=0xffffffffffff8000, 0x4) 13:46:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x1000000007084, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)={0x3, 0x0, 0xff, 0x9, 0xd, 0x1, 0x7, 0x6, 0x2, 0xb49d}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x7, 0x7}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1b) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000180)) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r2 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) kcmp(r2, r3, 0x5, r0, r0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:57 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/100, 0xffe4) 13:46:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:57 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x42000, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000000c0)={0x400, 0x9, 0x8, 0x9, 0xe58}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:46:57 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000001580)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001540)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000015c0)={0x1, 0x10, 0xfa00, {&(0x7f0000001500), r2}}, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000001280)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYRES32, @ANYRES16=r4, @ANYRES64=r3, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESOCT=r4, @ANYRES64=r4, @ANYRESDEC=r4, @ANYRESOCT=r4, @ANYBLOB="0ecef65a058ea7ace86bad8ee5226d6391d512c359d677db00419aef31fe5db524c54577d1f9d58b086c2a2448fa23665cf55c72c27d231cea585b2feb84d936a873748bc94f5eaa6a9e4acacb46ac04b75ef5e3f87de2679408ef82021c2b9349d6173c1112e45cb4a446ae738ca6071e0d18b4b9b37528be890242bcb04b04bb8bc4c6186eaf029569dcaf6bb4ccce597e4e68f993361f6f1add99d87b8a48f035f3a2ad328c8fd28b86bc4cdf768091835c4f1a69ed1eb13f", @ANYBLOB="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", @ANYRES16=0x0, @ANYRES64=r4, @ANYRESOCT=r4]], @ANYPTR=&(0x7f00000014c0)=ANY=[@ANYRES32=r4, @ANYPTR=&(0x7f00000012c0)=ANY=[@ANYRES64=r4, @ANYRES16, @ANYRESHEX=0x0], @ANYRES32=r3, @ANYPTR=&(0x7f0000001300)=ANY=[@ANYRESDEC=r4, @ANYRES32=r3, @ANYPTR64, @ANYRESDEC=0x0], @ANYPTR=&(0x7f0000001340)=ANY=[@ANYPTR64, @ANYRES64=r3, @ANYPTR64, @ANYRESOCT=0x0, @ANYPTR64, @ANYBLOB="a52e49099fe5c62bdd6776143f0e648d495ec9219a1678a23db93677502a3786fb49ca92900c5589550e7b4b0799188b49049e05d4fa66ee14ab6d829de42cad41cb0c431a555ce8e37b9781355ad2ae97a74e3fd67ee8ff1c88964a7c0f77a8026428f522c91a833789e329d156f35514e62b9ef0b44247e3a9b925615da2e8d2000bfe088f76c3", @ANYBLOB="6deecde6efb9c52d278c595c1d5f90669e0a2d54c31a1b3593e74604e9ab94512f04b7c219b97ee46be6cacf802d806ee089c98ea3332273abaebc2b62f7fa8206291d081f05a3ac67dd7a4cf080a5bbbc9f3ce48fb1c64244995c8b346d03ec65745eef9c03f9416ce57a17fa8277e28e131e0fd6fc0d0c713e3ea310e596ef5e", @ANYRESHEX], @ANYRES16=r4], @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES32=r3]], 0x12) sendfile(r4, r4, 0x0, 0x8) r5 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000001600)={0x3, r5}) 13:46:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:57 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x800, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x7f) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x3) 13:46:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$midi(0x0, 0x0, 0x82) ioctl$KVM_RUN(r3, 0xae80, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2b, 0x2000000001, 0x0) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffe97) setsockopt$inet_mreqsrc(r4, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r5 = dup(r4) write$P9_RCLUNK(r5, &(0x7f0000000040)={0xfffffffffffffee5, 0x79, 0xe803}, 0xffffffffffffffc4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x5298391e, 0x4}) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) r7 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x3f00, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r8, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) 13:46:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) openat$cgroup_int(r0, &(0x7f00000000c0)='cpu.weight.nice\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x4000) 13:46:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) pipe(&(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x0, 0x1, 0x2000000, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x11) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x1f, 0x8, 0x10001, 0xeef, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @rand_addr=0x10000}}}, 0x84) munlock(&(0x7f0000ff9000/0x2000)=nil, 0x2000) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f00000002c0)) 13:46:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x8, 0x6}) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:58 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/100, 0xffe4) 13:46:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f0000000040)=0xfffffffffffffffa) ioctl$KDDISABIO(r0, 0x4b37) 13:46:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) pipe2$9p(&(0x7f0000000000), 0x80000) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000017c0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001800)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001940)={{{@in=@empty, @in=@broadcast, 0x4e20, 0xffffffff, 0x4e22, 0x20, 0xa, 0x0, 0xa0, 0xc, r3, r4}, {0x7, 0x88ac, 0x0, 0x4, 0x2, 0x4, 0x0, 0x3f}, {0x4, 0x3, 0x4, 0x9}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x3}, {{@in6=@remote, 0x4d2}, 0x2, @in=@loopback, 0x3505, 0x1, 0x1, 0xc5e, 0x0, 0x9, 0x1f}}, 0xe8) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000000100)={@multicast1, @local, @dev}, &(0x7f0000000140)=0xc) sendfile(r1, r1, 0x0, 0x8) 13:46:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0xfff) ioctl$TCFLSH(r1, 0x540b, 0x5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) 13:46:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$midi(0x0, 0x0, 0x82) ioctl$KVM_RUN(r3, 0xae80, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2b, 0x2000000001, 0x0) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffe97) setsockopt$inet_mreqsrc(r4, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r5 = dup(r4) write$P9_RCLUNK(r5, &(0x7f0000000040)={0xfffffffffffffee5, 0x79, 0xe803}, 0xffffffffffffffc4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x5298391e, 0x4}) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) r7 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x3f00, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r8, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) 13:46:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)='ppp0!\x00', 0xffffffffffffffff) keyctl$describe(0x6, r1, &(0x7f0000000180)=""/227, 0xe3) r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='Fxfab\x1b?3\xad\x17\t\x17\xbe\xaao\x916J\xb5p\x9f\n\x04\x9e\x0f\x19\x9c\xeaZ\xd3jQl\x8c=\xbbb\xe7Vf\xb9\xf1\xc5\xa8\x9fW\x82\xa8\xa1U\xe4\x91\xb17@\xba\xe3\xb1)\x02*\xf1\x96\x87\xd2\xd4W\x02v0x0}, &(0x7f0000000240)=0x14) sendmsg$can_raw(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f0000000140)=@can={{0x1, 0x400, 0x5, 0x1}, 0x3, 0x1, 0x0, 0x0, "113ab0e1518c9190"}, 0x10}}, 0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x8000, 0x10}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000002c0)={r3, 0x101, 0x10, 0xfffffffffffffffb, 0xa1}, &(0x7f0000000300)=0x18) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, 0x8050, r2, 0x0) 13:46:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 13:46:59 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/100, 0xffe4) 13:46:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)='\rzU', 0x3}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x6, 0x5b, 0x7, 0x1, 0x2, 0x4, 0x101, 0x1, 0x1ff, 0x20, 0x7, 0x3}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) ioctl$TCFLSH(r0, 0x540b, 0xd578) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x2040, 0x0) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f0000000100)=""/218, &(0x7f0000000200)=0xda) 13:46:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x3c18ecaf, 0x200000) ioctl$VIDIOC_ENUMINPUT(r1, 0xc04c561a, &(0x7f0000000240)={0x4688, "326a4beb4d91c34b98bfdd83ea346411bae843e9acf94ecd05d627e3ff28ae7e", 0x1, 0xd6, 0x2, 0xc0b700, 0x1}) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000200)) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000002c0)={0x2c, 0x4, 0x0, {0x0, 0x8993, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) fgetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f00000001c0), 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") ioctl$TCFLSH(r0, 0x540b, 0x2) 13:46:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x31, 0x3, 0x0, {0x0, 0x10, 0x0, '/dev/sequencer2\x00'}}, 0x31) ioctl$KDGKBLED(r2, 0xc0045103, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:46:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)='\rzU', 0x3}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000840)={0x19980330}, &(0x7f0000000880)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0xdf87, 0x8, 0x8, 0x1, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x1, 0x0, 0xffffffff, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x1, 0x4, 0x0, 0x3, 0x1800000000000, 0x3a53, 0x687923fb, 0x0, 0x7, 0x8, 0xf6, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x2300, 0x1000000000, 0x0, 0x4, 0x0, 0x8}, r1, 0xd, r0, 0x8) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000b00)) prctl$PR_GET_CHILD_SUBREAPER(0x25) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000500)}, 0x10) mount$fuseblk(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x4000, &(0x7f0000000900)=ANY=[@ANYBLOB]) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@req={0x20, &(0x7f0000000800)={'bridge_slave_1\x00', @ifru_mtu=0x100000000}}) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000009c0)={0x6, 0x118, 0xfa00, {{0x6, 0x6, "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", 0x8c, 0xffff, 0x1f, 0x5, 0xae0, 0x0, 0x8}}}, 0x120) clone(0x8000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet(0x2, 0x7, 0x7fff) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x0) keyctl$clear(0x7, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000002c0)={0x60, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0x2, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x60}}, 0x0) 13:46:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x284000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="e2d40630033af7c319242ac8172c25b1d0d6f04f3d0bf911f5d5f714a14e280f96a820cf74bd489b2d2802bd98c862c7bebf1dd5ceb5a1d1e8ad99531f5f56d0f657d20834d2690b60c8300d2c486ffb88594489d56f11c71554153cae3307c74b7e36e2a7a8ee2bacda87856d2f5a114760ff2f6b8184d4c6e4eb64e6dd995f9581142fba65a05b15b6021a1ede96cce3b33ab033b1e21b36813ebfdc2a486f9ccc10aba5e891b3897393c23a652fd361841999ce5850922c2a0be1354bae6d38227e9f332dd80eb1000728f964586a22e338b2fc2bd6f470b2b951e4114db8cb80e5360f5ebe2aabefb46c", 0xec, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x14) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000280)={0xf076, 0x100000001}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000340)={0x6, &(0x7f0000000300)=[{}, {}, {}, {0x0}, {}, {}]}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0xf) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000380)={r2, 0x3}) 13:46:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0xffffffff, 0x6, 0xd96, 0x1}) ioctl$TCFLSH(r0, 0x540b, 0x26) 13:46:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)='\rzU', 0x3}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:46:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r2, r2, 0x0, 0x8) 13:47:00 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0x9, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0xfffffffffffffffa, 0x0) prctl$PR_GET_SECUREBITS(0x1b) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x2) 13:47:00 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, 0x0, 0x0) 13:47:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55ae", 0x4}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000840)={0x19980330}, &(0x7f0000000880)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0xdf87, 0x8, 0x8, 0x1, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x1, 0x0, 0xffffffff, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x1, 0x4, 0x0, 0x3, 0x1800000000000, 0x3a53, 0x687923fb, 0x0, 0x7, 0x8, 0xf6, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x2300, 0x1000000000, 0x0, 0x4, 0x0, 0x8}, r1, 0xd, r0, 0x8) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000b00)) prctl$PR_GET_CHILD_SUBREAPER(0x25) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000500)}, 0x10) mount$fuseblk(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x4000, &(0x7f0000000900)=ANY=[@ANYBLOB]) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@req={0x20, &(0x7f0000000800)={'bridge_slave_1\x00', @ifru_mtu=0x100000000}}) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000009c0)={0x6, 0x118, 0xfa00, {{0x6, 0x6, "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", 0x8c, 0xffff, 0x1f, 0x5, 0xae0, 0x0, 0x8}}}, 0x120) clone(0x8000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet(0x2, 0x7, 0x7fff) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x0) keyctl$clear(0x7, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000002c0)={0x60, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0x2, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x60}}, 0x0) 13:47:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TCFLSH(r0, 0x540b, 0x200) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xd90f, 0x2) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2048}, 0xffffff97, &(0x7f0000000280)={&(0x7f0000000140)={0x1c, r2, 0x51e, 0x70bd2c, 0x25dfdbfc, {}, ["", "", ""]}, 0xffffffffffffff45}, 0x1, 0x0, 0x0, 0x4}, 0x4040881) 13:47:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:47:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendfile(r1, r1, 0x0, 0x8) 13:47:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000840)={0x19980330}, &(0x7f0000000880)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0xdf87, 0x8, 0x8, 0x1, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x1, 0x0, 0xffffffff, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x1, 0x4, 0x0, 0x3, 0x1800000000000, 0x3a53, 0x687923fb, 0x0, 0x7, 0x8, 0xf6, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x2300, 0x1000000000, 0x0, 0x4, 0x0, 0x8}, r1, 0xd, r0, 0x8) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000b00)) prctl$PR_GET_CHILD_SUBREAPER(0x25) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000500)}, 0x10) mount$fuseblk(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x4000, &(0x7f0000000900)=ANY=[@ANYBLOB]) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@req={0x20, &(0x7f0000000800)={'bridge_slave_1\x00', @ifru_mtu=0x100000000}}) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000009c0)={0x6, 0x118, 0xfa00, {{0x6, 0x6, "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", 0x8c, 0xffff, 0x1f, 0x5, 0xae0, 0x0, 0x8}}}, 0x120) clone(0x8000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet(0x2, 0x7, 0x7fff) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x0) keyctl$clear(0x7, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000002c0)={0x60, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0x2, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x60}}, 0x0) 13:47:00 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:47:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55ae", 0x4}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) ioctl$TIOCNOTTY(r0, 0x5422) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '\f\x00'}, &(0x7f0000000100)='\xa4-\x00', 0x3, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xc) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:47:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:47:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55ae", 0x4}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 242.986621] Started in network mode [ 243.004967] Own node identity , cluster identity 4711 [ 243.026037] Failed to set node id, please configure manually [ 243.055622] Enabling of bearer rejected, failed to enable media 13:47:01 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, 0x0, 0x0) 13:47:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000100)={@loopback, 0xf, r2}) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x9f6, 0x280000) 13:47:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0xd52d, 0x200) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000500)={0x3, 0x1, &(0x7f0000000300)=""/175, &(0x7f00000003c0)=""/53, &(0x7f0000000400)=""/204, 0xd000}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r2 = dup2(r0, r0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000040)={0x8, 0xa17, &(0x7f0000000980)="449fbc85ddd875f0c85370865a24846073f396b41a43a4d22e6a00bebd6c4f84b47b0df10663af1084af89e6c8ea6644e25121f4c9d0bc6df2e7c364ebc7cda9d5067154f85e7c724390e9839a6b3864429fca96024b4cbb439e4b4ab2b372552d6a4e391d92e0d753425ebdac0dfff88c8664ea07bfe356783cb128c476100cbfd47870a9843382710638daabe04b5d2dbaf24d8d4bfec7fe907d4088a111368c4795372cf60a6b74add7b3480cf6691b45904c02f7f2e1b66b15d7dbb35cea2e9f38c0c42772d989af96d9", &(0x7f00000001c0)="b7ccc2bf6bb907cf4e0f81f65bb3a8c1214e9e3e8e1ff890a47554fcc0707679f3f796f6312ec580db1b466bb418f5c3a0673e224da9dacf4d7f4e13ed0173f6226c0698f09c236a30a79bae57d85deaba6b366379957519ad400f2206ef21994ff0f0f08e205c9bc22fdcec00c5ef90345783f597eabd8313a9ce4917649196b13e15937bb5c2981aa9bcac183daa9a27d8f3e86f4d23b73230edaaaf202d5a7993310003da378279e4184e4ea14f110277da51a0db058365fcf37787d71054d42b1f2fff457b", 0xcc, 0xc7}) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000840)='user\x00', &(0x7f0000000880)={'syz', 0x1}, &(0x7f00000008c0)="6bc7382fc831e100af2b335431d5dffcfa47083214366a9eae0bbda3cf918f4bb2a4e3d43cd6558af5cefa16bcb678ef01dc59b8d196b41dcf4e54e243b761d57448ab4c53f294093c720f6afda3c092601af6e5716a4dfd1cfb8c159e81833f6a356eada68d09d86cbfefb9617acdfb9dd21cef1b4148254b7010a5e7c2d14c7cff50320379b131aa04160ee7a20222d6878f86683b4063a2", 0x99, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000800)=[{&(0x7f00000005c0)="eec02da4dcc74636f2b0f332c8cd257319aeb96614c07652d07c43738779c363f1bf406864fe6525281b10c11184fe3bbce1f5135f292c2963c0bb849244682190c6f91546bab3ea859007715f131023bd572629f7b3468b803401f2aca518683edb1539f4e7fdd2e6fdf789a26119865d4199f86e4b238f8476e85dda50fa9b71532bb3616e1a42063dc20a0d1a6fa703b3f1f5e69c30ac671c70b10ef5a1220666894706296dfe16390794f45499cf1b709772754dbf57634fa5ba2adb9d73275dc2edce8ed409a76c7b1ed5bf89044f52e430b80b8afb7744ca9294ef2cad2165edd6f395f686b90765a862b89a2f778b287b845a8a1fb0184cfbe438", 0xfe}, {&(0x7f00000006c0)="5e28a05d01bd1fdfd8a779c17b2a488b3abef5a26c4487be93c229bf10635d9f0fb825dbc197299bdd73ad8fcc0a1065e9b1211fd0133c01dc78fbf0b0bcbfffe453cf9d0ebf069ddf8773505503d4db98954824c7b00f9e2d5129c0fd519f43b5e7cb9f4cb007fbf6adf4e9439b4a97045bf1543b52b1e7dcc097f0e084672f3710e778bd5e1190f86c0bca97fbc5778f334033b8b45eecb4e1e9eb3795bd5b5afc1d711a64277c76447de83c79cd9f35f5d4269c89b6bfa2ffe52f4362024c77e3166ec405ca3ceb77", 0xca}, {&(0x7f00000007c0)="6f1828eaf6dd978a3b61a6b6391ca59f4426c5ef308759e866bb0be345280919671f3d093a0b7c0e8e7777d111f7c16d2027", 0x334}], 0x3, r4) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x4243, 0x6e12b826, &(0x7f00000000c0)=0x4}) 13:47:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 13:47:01 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x101000, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000300)="ce58ffec21bb31fce9e2dc30b0d41e7ad81818a3632550647bb303de5e2cf0bd29f076d9bc00274b790b478ecc652d375021297a705d722ea8cb81eb875fe22a385b1a9ee1b30958359fe7fb62538177923b0511e90591cb52bc13f4237959e690705c1eecbc561a34b572ebd50edc205c2447880d05fecf1d42600e0d9afcef67cfb0213cbf27cfd1e9e52d6830074f7abbda2193f8e497badf68b9a8fb", 0x9e) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0xc000, 0x0) bind(r1, &(0x7f0000000200)=@llc={0x1a, 0x311, 0x2, 0x7, 0x95, 0x81}, 0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="856b51dc5df0ad47b2434117b652"], 0x4) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x80002) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000140)) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x1) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x8) 13:47:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000840)={0x19980330}, &(0x7f0000000880)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0xdf87, 0x8, 0x8, 0x1, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x1, 0x0, 0xffffffff, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x1, 0x4, 0x0, 0x3, 0x1800000000000, 0x3a53, 0x687923fb, 0x0, 0x7, 0x8, 0xf6, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x2300, 0x1000000000, 0x0, 0x4, 0x0, 0x8}, r1, 0xd, r0, 0x8) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000b00)) prctl$PR_GET_CHILD_SUBREAPER(0x25) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000500)}, 0x10) mount$fuseblk(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x4000, &(0x7f0000000900)=ANY=[@ANYBLOB]) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@req={0x20, &(0x7f0000000800)={'bridge_slave_1\x00', @ifru_mtu=0x100000000}}) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000009c0)={0x6, 0x118, 0xfa00, {{0x6, 0x6, "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", 0x8c, 0xffff, 0x1f, 0x5, 0xae0, 0x0, 0x8}}}, 0x120) clone(0x8000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet(0x2, 0x7, 0x7fff) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x0) keyctl$clear(0x7, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000002c0)={0x60, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0x2, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x60}}, 0x0) 13:47:01 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendfile(r1, r1, 0x0, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xf}}, 0xf4e47f90df338d84) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xff, @remote, 0xfff}, r3}}, 0x30) 13:47:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 13:47:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x410400) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4001) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2800000003000000000000000000000001000000001f000007000000000000004e45545f444d0000"], 0x28) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:47:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = semget$private(0x0, 0x0, 0x8) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000000c0)=""/87) 13:47:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 13:47:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) dup2(r0, r0) 13:47:02 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='3:2\t'], 0x4) sendfile(r1, r1, 0x0, 0x8) 13:47:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TIOCCBRK(r0, 0x5428) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000180)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:47:02 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, 0x0, 0x0) 13:47:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1000, 0x129000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ifb0\x00\x00\x00\x00D\x97\xd8\xb0P\t\n\xf1', 0x0) 13:47:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000840)={0x19980330}, &(0x7f0000000880)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0xdf87, 0x8, 0x8, 0x1, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x1, 0x0, 0xffffffff, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x1, 0x4, 0x0, 0x3, 0x1800000000000, 0x3a53, 0x687923fb, 0x0, 0x7, 0x8, 0xf6, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x2300, 0x1000000000, 0x0, 0x4, 0x0, 0x8}, r1, 0xd, r0, 0x8) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000b00)) prctl$PR_GET_CHILD_SUBREAPER(0x25) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000500)}, 0x10) mount$fuseblk(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x4000, &(0x7f0000000900)=ANY=[@ANYBLOB]) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@req={0x20, &(0x7f0000000800)={'bridge_slave_1\x00', @ifru_mtu=0x100000000}}) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000009c0)={0x6, 0x118, 0xfa00, {{0x6, 0x6, "795e65b053871bbda9044be06589346d1bd2b1a3542664369b0785f6ab8efacf40b7481c2e9418e94434382a7c7763e3e7e245121dc08f8d355796652a923904c3bc50ed4cfcdebdec1ea94db988fb26184fcbd3fb5397accea96d8c1fb21208505a98e50f7516d228e80c81889f85dee80e0380d5667bec31e6697ab4f7f1ab62a14fb4b6bf81ddd3ce2752399b53dc85095e3b338dccade96abbeae17a67b509e8d6dd51a284f736f1fff9a7de16bc1e755100bf79252d22cddbae8da34ef3ac85eaef9e9f58faa61c62adfc34d3411318993afbfdde2831a87e4d2a3a691fae00a928301a33f6f0a2c3de37c25ae9a0ae2a6592a71d78ac596e68da85bee6", 0x8c, 0xffff, 0x1f, 0x5, 0xae0, 0x0, 0x8}}}, 0x120) clone(0x8000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet(0x2, 0x7, 0x7fff) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x0) keyctl$clear(0x7, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000002c0)={0x60, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0x2, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x60}}, 0x0) 13:47:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:47:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) 13:47:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:02 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000004c0)=ANY=[@ANYPTR], 0x4) sendfile(r0, r1, 0x0, 0x1000000008) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000480)={0x0, 0x4, 0x3f9, &(0x7f0000000280)=0x91}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) ioctl$sock_netdev_private(r2, 0x89f3, &(0x7f00000002c0)="99c2e9481719a77fbbc5a0d45079376949dae35db8ff149038464ddaa294ebf9ffc2def41a155c8e68edee2afedff9f7d401f2cd16fa100e216566a316b48b27385b902100cb4074ec6c5d2e25bf42f82551f18ea5da9cf1a5f4bc2ff1d5e374b46b8718c38f2ef7b4d5650b52d83c01bca475ecaf821b672138d63d76c1d318d52073471b9e8e405bb2ceab59d79a12ae99e377282ce1bc934f1a0a9a8411d45a") r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4200200}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r3, 0x420, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x4000011) setsockopt$inet6_dccp_int(r2, 0x21, 0xe7de2adee1941d6f, 0xfffffffffffffffe, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000826bd7000fedbdf250a00000080000000000000005800020008000900ff070000140001007f00000100000000000000000000000008000900000001000800030003000000080009004d5202000000080002004e220000080009000005000008000000080004000040000000000000000000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4000010}, 0xc000) 13:47:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x80) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'raw\x00'}, &(0x7f00000001c0)=0x54) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x180) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000200)={'lapb0\x00', {0x2, 0x4e22, @local}}) r3 = inotify_add_watch(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000000) inotify_rm_watch(r2, r3) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 13:47:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xc5, 0x2, 0x3, "f274d76adda079291ecb42ef4b320531", "092fbb858c8edc910fedf76d4eb9eeb6532565678e84be2fae83f85292b25c135266b71030700d7df1fa962d2f3ce513e97d066ee3df03480f5ccf63bcfbd088658d0676e0dc7f3133102ad1b831c9c5513e8fadaf2810df9b8cb5ce85119ccfce3e4f13966c8af4a24cb96e525722504554706339f5ea49cac2860d7615a16b1aa8469ce74eb98938c86add19306f427cf64b73a90d24ba57b08507bba04d00134d8d0fd795253aaa9400f39a76fe6f"}, 0xc5, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x2) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'netdevsim0\x00', 0x200}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_timeval(r2, 0x1, 0x14, 0x0, &(0x7f0000000000)=0x16e) ioctl$TCFLSH(r0, 0x540b, 0x2) [ 244.728267] Started in network mode [ 244.761778] Own node identity , cluster identity 4711 13:47:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x0, 0x0}, 0x10) [ 244.787177] Failed to set node id, please configure manually [ 244.830059] Enabling of bearer rejected, failed to enable media 13:47:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000840)={0x19980330}, &(0x7f0000000880)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0xdf87, 0x8, 0x8, 0x1, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x1, 0x0, 0xffffffff, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x1, 0x4, 0x0, 0x3, 0x1800000000000, 0x3a53, 0x687923fb, 0x0, 0x7, 0x8, 0xf6, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x2300, 0x1000000000, 0x0, 0x4, 0x0, 0x8}, r1, 0xd, r0, 0x8) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000b00)) prctl$PR_GET_CHILD_SUBREAPER(0x25) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000500)}, 0x10) mount$fuseblk(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x4000, &(0x7f0000000900)=ANY=[@ANYBLOB]) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@req={0x20, &(0x7f0000000800)={'bridge_slave_1\x00', @ifru_mtu=0x100000000}}) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000009c0)={0x6, 0x118, 0xfa00, {{0x6, 0x6, "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", 0x8c, 0xffff, 0x1f, 0x5, 0xae0, 0x0, 0x8}}}, 0x120) clone(0x8000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet(0x2, 0x7, 0x7fff) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x0) keyctl$clear(0x7, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000002c0)={0x60, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0x2, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x60}}, 0x0) 13:47:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000000000000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x480800) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x4, 0x4) ioctl$TCFLSH(r0, 0x540b, 0x100000001) 13:47:03 executing program 2 (fault-call:6 fault-nth:0): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) 13:47:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x0, 0x0}, 0x10) 13:47:03 executing program 5 (fault-call:5 fault-nth:0): r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:03 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x0, 0x0}, 0x10) 13:47:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) fadvise64(r0, 0x0, 0x40, 0x5) ioctl$TCFLSH(r0, 0x540b, 0x3) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x101000) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f00000000c0)) 13:47:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x33) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f00000000c0)={0x5, 0x71f8a7b2}) 13:47:03 executing program 1 (fault-call:2 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:03 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x2, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 245.678082] Started in network mode [ 245.687896] Own node identity , cluster identity 4711 [ 245.702577] Failed to set node id, please configure manually [ 245.709644] Enabling of bearer rejected, failed to enable media 13:47:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000840)={0x19980330}, &(0x7f0000000880)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0xdf87, 0x8, 0x8, 0x1, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x1, 0x0, 0xffffffff, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x1, 0x4, 0x0, 0x3, 0x1800000000000, 0x3a53, 0x687923fb, 0x0, 0x7, 0x8, 0xf6, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x2300, 0x1000000000, 0x0, 0x4, 0x0, 0x8}, r1, 0xd, r0, 0x8) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000b00)) prctl$PR_GET_CHILD_SUBREAPER(0x25) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000500)}, 0x10) mount$fuseblk(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x4000, &(0x7f0000000900)=ANY=[@ANYBLOB]) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@req={0x20, &(0x7f0000000800)={'bridge_slave_1\x00', @ifru_mtu=0x100000000}}) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000009c0)={0x6, 0x118, 0xfa00, {{0x6, 0x6, "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", 0x8c, 0xffff, 0x1f, 0x5, 0xae0, 0x0, 0x8}}}, 0x120) clone(0x8000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet(0x2, 0x7, 0x7fff) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x0) keyctl$clear(0x7, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000002c0)={0x60, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0x2, 0x0, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x60}}, 0x0) 13:47:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x240001, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) recvfrom$packet(r1, &(0x7f00000000c0)=""/39, 0x27, 0x2000, 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) sendmsg$nl_crypto(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x208020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@delrng={0x10, 0x14, 0x2, 0x70bd26, 0x25dfdbfe, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x80) 13:47:03 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:03 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x541b, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:03 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x800) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000140)=0xb614) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffff7fd, 0x38040) getsockopt$inet_int(r3, 0x0, 0x1f, &(0x7f0000000040), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={r4, 0x5}, 0xc) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000300)={0x0, 0xff, 0x2, 0x80000001, 0x6b}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000240)=0xa) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x34, 0x0, 0x3, {0x2}}, 0x8) openat$ashmem(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ashmem\x00', 0x80000, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f00000005c0)=0xe8) r8 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000a40)=0x0) r10 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000002f80)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000003080)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003280)={0x0, 0x0}, &(0x7f00000032c0)=0xc) r13 = getuid() getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000033c0)={0x0, 0x0}, &(0x7f0000003400)=0xc) sendmsg$netlink(r3, &(0x7f0000003ec0)={&(0x7f0000000400)=@proc={0x10, 0x0, 0x25dfdbff, 0x400000}, 0xc, &(0x7f0000003e80)=[{&(0x7f0000000600)={0x420, 0x3a, 0x20, 0x70bd26, 0x25dfdbfc, "", [@nested={0x160, 0x85, [@typed={0x8, 0x5a, @u32=0xf0}, @generic="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", @generic="67ffcb0ecf52b178d1751e4fad9c6efb62e3ae0d42f6e2bc4dec7b84f41424ed19762445785af3976e23e3135c8c38616df37fce2458739aabbb09fee2b1302bae116fa5e8625195bafdaab3066590344d7dd7f3b8b5f4"]}, @nested={0x14, 0x3d, [@generic="ff7469986ed3e393e636478eb44745"]}, @generic="2521cdb7a4da5cbf512d3c93c49f68caeb791ce8cbecd66c4be184a84ef66b4f073530336fcc802be4477593f4c81da29b16a72eb74da4a5465bd91349e8249b6308f6d40c19d7", @generic="33c973664da75c5268fad32f4c856c8b4dfb5c60bc14f6f7901b2c6c5c5d9841bd89796253b0b6eb83e9463e3f991b3a343f874d1fab993bdea6775b49ed3853020995d33240bb3f0df55fed3cb0c32bf0f6540d02e7c68e713178def64b24091a0048efd82ff871c5db459129b607543a97e0b5f57b11c537754a95d010bf09445543b3a52c391604c1cce6c5e305d1003d725b9d212b75786ac75ed4e23d5b30a1aa", @nested={0x1b0, 0x27, [@generic="393880dfce232341cb6be1e52ecdb5640b8fe43ca6dcdf80e40b582ca27d42c739c3267a54260d51f08421e39d7c21c31bb27201f98f547c822b48dd6521d01a05a57ece6ce02fb4e5b19e76c795557539e155039b0baa78874004dd02b43f46d216e0cc130b38af20f1796edf377cc40b00b4e3cda9b82eefb032d083af4f8446b2d580c3f9dcca3e0cf4c18603bf832008ce96bf4e6be3613bb0cb4e911206d152d42131d4e1159154683446a6869e621daf2445b1146fcc414c492965819c9146f4b36e08356ded", @generic="0b95fe080afd05cf34cecff5c7", @typed={0x8, 0x85, @uid=r6}, @typed={0x8, 0x8b, @uid=r7}, @generic="f88b5aeec57982640bcb34531a8fc6612b842e72f2e7d4961f3d895fe6ab81cb96a3e1b1f7692f4af4b1444862fc954f7a1e4f94a39aabd5dd6b54994c5485820aadcc9d04ed299ae32553d09954f8a8b85f7491730ea9a56b7cd624293dd9445ab6a4c8a590a903da39f9c06420e4a19c03db33cbbb46c949e19c78e0e53bac0f2ba806def91b177fe4eacfeb570fbde5264cdaaa051b48877f7b3e67f94e3b63932cf229b0180c8501c50b665c5c78b685c219dd4ecf6d16c2b9eb597005fc4b4b2e1a"]}]}, 0x420}, {&(0x7f0000000a80)={0x22e8, 0x31, 0x120, 0x70bd28, 0x25dfdbfc, "", [@typed={0x4, 0x6}, @typed={0x8, 0x83, @fd=r5}, @nested={0x1164, 0x90, [@typed={0x14, 0x5b, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="17b0f86e691f519347f0683443f32547f1bd5fb4d45f16492a6b861f0c270bd9ab61566264ad49cdf00ce888cd237979f800ad20042d39b450c012d82ce82ad076c3a537dcf1819a25fa26ad549a88fecb79cec7a84a2077c07c79bf7a1792a2932eb57becacfd49c36c1ee1d84a89b3a97995822a7f5c024165a1e2e834fcb6232a5c7110ef351171246c1ef08ad12f54c02e9c2fe1672e73df5738f3de94e6b53d2fb5bc982cdf28050a08ccb2cf9367f28cf7f84e328cff0ace4e2210d6fdda8837dba5e1", @typed={0x8, 0x1a, @pid=r8}, @generic="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", @typed={0x8, 0x85, @fd=r5}, @typed={0x14, 0x71, @ipv6=@rand_addr="6e11e815f063fe63bcf43b30d37cb684"}, @generic="2c018d3c07a0387881bf63a44b58571cf0ea9d59560b0e32c9c73d4b7e28b907a312d38be50d52af636bfb7cb875d01462c535623c21cd31334e9618fbfb1de5068ddce646beb4dd0c536a7184affcc19ed86f01e5cbf0cda93517dea2f52b5d"]}, @typed={0x8, 0x7b, @u32=0x3}, @nested={0x1160, 0x19, [@typed={0x8, 0x37, @pid=r9}, @generic="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", @generic="4986f6279f0b9951878bb601c1baaa6cab7e05c05119b35b849335e2cb469f29659abd77e009ef2609f48e8f230a98b5697418b8bb7bafaa0af56366e5b7add81d58b9abaa2d008ead38d9fe02805f58a949d9", @generic="b9ef032aef8dca55e853c304a5cd541fc95430822ac1d75952ec2919a477f7f521a054601e7d64e6a2f2e47c3268dfede1bbedd9052aaa3b1f8a01bdbe9e3ffa621d3e031f8b602402a2036a737e385a2109acc71ccb2acc0e1519c42edc6c33da7b5e579fa8c4f8899a8a71c43ebc47d1eee689d6068df071f2a2da5dba0d897189f1957cf5230c8f1d92e7b697c914594ec9e8953ee4fb231cf2fa95847e1bedd3e1a14a27bfd2c56328c6d800f7b5a2c11e938768abee62556ea04ca57281ede465ffb425c6d2e0b06ae92d2f8200b99593075082477e375951", @typed={0x14, 0x50, @ipv6=@rand_addr="3dc99a3233a7be3e9d3295c638330fa2"}, @typed={0x8, 0x16, @u32=0x5}, @typed={0x8, 0x53, @str='{\x00'}]}]}, 0x22e8}, {&(0x7f0000002d80)={0x194, 0x26, 0x400, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x40, @ipv4=@rand_addr=0x8}, @typed={0x10, 0x3b, @str='/dev/ptmx\x00'}, @generic="28ebe8c0afc177425dddd8", @generic="4e522cb412091c7a18eea2b1c527f8c868a540b61048ae", @nested={0x148, 0x3f, [@typed={0x8, 0x9, @uid=r10}, @generic="07fd68cf31f2b34709e3f2fbb62e5c12f6fb775d5988ed6986c5b0531d403fa875b988d9437fc06f064b2d2e31f9b1d256b04d241018b2c3215df19e038b919ce8429b92d24a0b8620028a08ad6afb68e1b8587301cd99a6e6f7923e33a2b707bd474d723daa6512e5f92b58bf0cdead7c8b7c9698cebb4cc51c7ba8", @generic="49af48d5db22402aeddf1c5742bbc5a32923c70a1d2e2cfe0188326125c405999b07e4c8bdc1d6e24714af1e242b8aa08c7e2bb225fc84c97080eabcbbcd0573aad0b4d80aed3ba92d06fb2c16d74d7a16609621e27e8c853717a65d363ccbf3d36bdbcbca699ff0bd894694162fc6124e05eb762746f46f566841b73bc15ed6c78770bef4769d7af679941e128c734a837faa00d343af2b0d691290ba1882", @generic="0c153c8b35f42144022408f2c60538321044fa9d823c0841f532b6053786a14449"]}]}, 0x194}, {&(0x7f0000002f40)={0x40, 0x3b, 0x100, 0x70bd25, 0x25dfdbfe, "", [@typed={0x4, 0x7c}, @typed={0x2c, 0x2a, @str='user)vboxnet1+vboxnet1wlan0selinux&}\x00'}]}, 0x40}, {&(0x7f00000030c0)={0x16c, 0x2c, 0x200, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x20, 0x3e, [@typed={0x10, 0x36, @str='/dev/ashmem\x00'}, @generic="4fd42dd157e3c1676900"]}, @nested={0x28, 0x68, [@typed={0x8, 0x4d, @uid=r11}, @typed={0x8, 0x38, @fd=r2}, @typed={0x14, 0x3, @ipv6=@local}]}, @nested={0x30, 0x64, [@generic="5afd7d", @generic="9ad6929a47cbd2d13d35549d9a61fa126cb65a29fdcadd23cf8a0708c2d3a3b166e2919f6c", @generic='Qb']}, @nested={0xe4, 0x5a, [@typed={0x8, 0x5c, @u32=0xfffffffffffffffd}, @typed={0x14, 0x57, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x8, 0x37, @fd=r3}, @typed={0x8, 0x61, @u32=0x2}, @generic="c6f2850813d8e32d327c5cca8fa6eedab9f01b6e8aa62f743119b3cba138e7e55f35dbb0eb6eee0e1a2aadc8356ecd643c246628fc8b76b0df4625c639a7ba97a908f4970daf468657f73cd492e3f5e0c6003702fd77aec4f16ea1d846684007fa7045c0d47e17a4efdc39437291158f95f82ad410f9f5b622a703c220949fe7cd5272faf0f5f1814c7b532c3c644b22013f014b8991152497546265ca650522979c3bdc261127e0f6114133c8a92ee8410569"]}]}, 0x16c}, {&(0x7f0000003240)={0x40, 0x2a, 0x314, 0x70bd2a, 0x25dfdbfe, "", [@generic="948c8304fa241f520840e739d01733d49e4c00bd790136e787509835d014ee9e9899db813f333f58d08679d65cd236"]}, 0x40}, {&(0x7f0000003300)={0xb8, 0x41, 0x900, 0x70bd29, 0x25dfdbfd, "", [@typed={0x14, 0x5f, @ipv6=@rand_addr="5306249526da0ad580017ea05e5907a4"}, @typed={0x8, 0x8, @uid=r12}, @typed={0x20, 0x87, @binary="58d102e47b04a600f7a1c9e96dea92aa33f9934a51a35dee3968"}, @generic="93e2e34160cd7068cdb9253533625af6a7025b6a0dfd55202f2bd73e77711b215e006a022f9fed97b9a6818e72e01ce3dfefafe345ca2d8d0116914bf238c6c45d38488b5d93ec4e6f61dbb841d96394c2ad1818f09547dd51e35b6b72", @typed={0xc, 0x4f, @u64=0x1}]}, 0xb8}, {&(0x7f0000003440)={0xa34, 0x42, 0x404, 0x70bd26, 0x25dfdbfc, "", [@nested={0x1d8, 0x17, [@typed={0x8, 0x81, @fd=r2}, @typed={0x10, 0x60, @str='/dev/vcs\x00'}, @generic="908cb97ef744d96c12046d5a0307088bc5fc6d076b6f939cd18f7fdc97698f9da6ccd4f169b76093fe465f980dcf70241e3e65893892811a21cf8ffe6215d67cde7aef47a3f9e6f909e9c9da3a82b0e210b8f888143f72686761af8dc8c41636f4fb553dda08a97b07870712d5adbd42e3a9e14d9f3e30fcf1f235e62f62da3cee1fdf12cda1434898e0f59129ec4162f0f8c0d2bb28f255d6e0bd23f940655cec2e7de7043b0bacf232d31cc1d3d6a937cbe4e13e01445455e16adf90e4a6f404c943db8db7932c7ba463878e60219c4dfe4b703f283ecb05145f0d18751ad5fdaf967171c2c335c54788ae2dd311c6", @typed={0x8, 0x52, @uid=r13}, @generic="4181413866b280762ec3b708c36058caf701526e48ec", @generic="3dd89fb49a06a046f0d2cf10e74f62103fec6fdcdbbda3cc351421e500e7e249bf8d58d6915e2e52db9aa054bb150a5cb691bc18643cac460813240ef21e4eba9a03e9344d1e631f15f369e6020de7d0688070b91b87977e4b3c26daa2527ae6f3187a3a6417042ab912b136642f4e219926b704a9252d2573452d14e49c92218d0a4c5ee2537def22869f28831b1233a9ea004ac160ca469cd81c", @typed={0x10, 0x39, @str='/dev/audio#\x00'}]}, @nested={0x404, 0x32, [@typed={0x4, 0x5a}, @generic="0a081dd202b830dd3a20226d09f89215759e6468539cc20ccfbafd20562114b6ea8ae515ea2a02d8d741e9b96025b83aae224e19f88085f4bff9795720822858d7c6ec6a9a2282f14764cd52e7c93a5cf74b853b7b6b8647ea041cb311", @generic="41714c08f8e55d5700dec6a9297f4b608f75a28160c78f614fdb756722fa198a039ff14d461d76965b8086b31b179268f62557466000563bb98ef6bbe682e8c29977776d0e4d44aa843ef8114a828672b021ea0b1157dfc49caa8544dbe14034c744259e77a1a74c4d1f131f7d2ff7ef1e1e42039ec244e7f792f0578ae84fb54cdf29699de555889c6874c1a460246dd53aff39eae1e57b11256da50135df5c40f7920c4938ef38f5e689d8801310a487f64980c3fa79029963137744e9b6b50fb604c0548119a9110bc5a9", @generic="3178bd608f4db60ee317d9853e0f428f97cb92c8421dc1c46182768ca6d3c5e6afe737e888b7996df3306fa39857fc2848756d665b382b02f8b8adc8527959070ffa148212750e0f8628caa9a384114a114336ba04c21c325a77905cb69f89ad99013263a955097dce615282d82164038713926330e5159b5cdc007fc98af7693825a9b663ddeb28024e51730d322f836e55fae07864e8e83ef3ef8520e4309d563e24fab65a9005e4f8932726438b21153ed9b846edd310634a16a7e3c170ea5c9d1d48a9d95700dd1f1ab3b0e87e0376e7bc2d18b42546fc803bdf7f56379a0eaa6291b8c44ee114651b59cf0694f7ac36a88453", @generic="cc7f888599176c6dd1c84360eec19f43797357a79ec66d8982736ec499937b28f520c0e8c8e78552254f9bede15243ea08a7125ebfc0e622f1b80509ea41e776a81353ddac91ea129de6d9d6baf7fa37d1b3b5cd1e748d10f199e0296d3c77e7e7c7118409c93c4cf9339250b2854811f153f0e87d39c8e28560ed9cfecbd8fac4322ea569a15bc0fbd299cdde9b6c5c8561f9b39148ebc4aaaa71b2af493b4329e014fb9c8c7d9012e4f87b4140f349381a6856a81bfdbba0f5307241d3d02760647f46423ed6f4183b951f1947440fc9f241d28e65aa3383d3148a57", @generic="851c", @generic="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"]}, @generic="cee2582d8a7768431f2050d78f255d2eb6dd46ae794a2c2858d2ddd12c2664ebfeedab874e865b9a5f4f93c25ba07e622013c1ef83c09af5267554eb0653a1806cc3bfd6fa9a8655d4f447f9959902ca0261c21beb8a5cd5c1747775fb0cbb2199d58bf5ae9b6c85fa56e0fb4701f172ca7dc2536b5551efc3866a9990c0e28f031a6865b4", @typed={0x4, 0x15}, @nested={0x3bc, 0x91, [@generic="bea91537189e7e23b279dd27b15e5251a6c6a057a165102fcec632b73c0de1de7e118259e778678a0f3ff3ec00416f18cb0048c0bafa41949ee99ac1a0a540887d779381bbfad0c266985182866f63a2b2b1f457bd144ef7aa6f56a5a04515d2b85850f9c3673d2fa1777d61728b6803e47d03544849798ccae039", @generic="480065d22cb2dbbec8c13e2aba8b207290ec4527d54261a69fe2dbf98f592cc1bfb412099ede5457384e560f9d08de04f06896bd94b84bb3f097d3615191a5585a115f2593cc71bbb7f994e42af9f0bfa41b7df5b66e538dfb285bf6b8f5d81f29895a351effeef6e1483cff8e6c63f897e5da79a04248b1bdcb5912b2ad73f15f6c00bad016", @generic="aaa49f240f7ae9865c09249314fef9319b065ab1f6692c3e408291a573282c0ff83154941872261eec05493318a1889bbb75aa6a2ffea58a4b912be0f02a7883f08e0d60be0cfba401d5cd0adfda8f125cbf3c06c5cc2f03cc82496d367735de0b3f21c3eddf6b7149a87f55b7c3679ca768967d87fed7a19b2d30a9eda4430738b94e08f71964f23b8a1d51db896a93", @typed={0x8, 0x20, @uid=r14}, @typed={0xc, 0x59, @u64=0x6}, @typed={0x8, 0x27, @fd=r2}, @generic="31a08483c1834f016672de115351c39c7647a459a26c40388277e251525427b3ece4fab4811f01b7d1cbfc9a8492d94d83ec2d1a20af0c7194c5f49908826838590299bd9b1971eaac952ffbf9d1ef60fc5816e0b4add485274aa1c736f1bf0d39888482183da6ee636487a683dbf891b77dc62bc21cbbf000704f0634af89bc2cd0a8512d2117aa7a642210520a4d7662abeb05237e59b3c5d69c63b8241e80a99323a10e9b8865ad", @generic="fffbc04af05b2ad93d2f2af2ace65c837ec86df06c9b75f063e8e5d7a522540fa89d5aed70b31d9f0cd55a2cfaa9b1bdee876111e60b57bcdb1b59f00de1925b611fc09e02cbec6335ac5ee101596a7d86575282d537ddf6626300bad6fe5b0c6d1af8c60e04cd365e804b113f902d6932c5e2b0e29e1de6bb490b22147c063b7e1414dcc5f582d909d857500ee0680478898341e34181e665d4a0a345f616863e61dc79977e96662f57d16b7e90c029ecb9760addf10f843341a9fde11d03969f561b49676fa783710e1eee2a62f2f3097c73de6b301d0974", @generic="4a1223fc79250ef6bde6a0bf6155b1c24f1989328a3c91aa80873eff041db0f4b9208793cde4635f033a3896ca3bab809701668a4b261aad50398e437ac6cae66856518b812353b981977c651bdc6bd665b382121ca3415cc23ebdfd7a9ce8b7eb36b076891d8a2d9330788e3311fa642f2fa5803acd9109468221a3269d49064a97d6f17c5ef8"]}]}, 0xa34}], 0x8, 0x0, 0x0, 0x1}, 0x20000810) ioctl$TCFLSH(r2, 0x540b, 0x2) write$FUSE_WRITE(r0, &(0x7f0000000200)={0x18, 0x0, 0x8, {0x991}}, 0x18) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f00000001c0)=0x4, 0x2cd) [ 245.751408] syz-executor.0 (12778) used greatest stack depth: 23328 bytes left 13:47:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r5 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r5, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r4}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000001c0)={0x10000000}) prctl$PR_GET_THP_DISABLE(0x2a) 13:47:03 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x5421, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x2, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:03 executing program 3: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x3) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x40300) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, &(0x7f0000000040)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@remote, @multicast2, 0x0, 0x3, [@remote, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x1c) 13:47:03 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x5450, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 246.024008] QAT: Invalid ioctl [ 246.042545] QAT: Invalid ioctl 13:47:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x3, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 246.080888] Started in network mode [ 246.093833] Own node identity , cluster identity 4711 [ 246.114789] Failed to set node id, please configure manually [ 246.116090] QAT: Invalid ioctl [ 246.135318] Enabling of bearer rejected, failed to enable media 13:47:04 executing program 0: clone(0x20400200, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf6\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x5452, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x4, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x100, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8000, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) unshare(0x40000000) socket$inet(0x10, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000001c0)={0x0, 0x4}) 13:47:04 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0x20010364) 13:47:04 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f00000000c0)={0x8}, 0x8, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000001640), 0x4) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mlock2(&(0x7f00003f5000/0xf000)=nil, 0xf000, 0x0) pipe2(&(0x7f00007f2000), 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, &(0x7f0000000080), 0x1, 0x3) [ 246.736922] QAT: Invalid ioctl 13:47:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x5, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:04 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x5460, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 246.760852] QAT: Invalid ioctl 13:47:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r5 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r5, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r4}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000001c0)={0x10000000}) prctl$PR_GET_THP_DISABLE(0x2a) [ 246.822399] cgroup: fork rejected by pids controller in /syz0 13:47:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x6, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 246.935640] QAT: Invalid ioctl [ 246.946865] QAT: Invalid ioctl 13:47:04 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40049409, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 246.984001] IPVS: ftp: loaded support on port[0] = 21 13:47:04 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f00000000c0)={0x8}, 0x8, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000001640), 0x4) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mlock2(&(0x7f00003f5000/0xf000)=nil, 0xf000, 0x0) pipe2(&(0x7f00007f2000), 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, &(0x7f0000000080), 0x1, 0x3) 13:47:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r5 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r5, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r4}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000001c0)={0x10000000}) prctl$PR_GET_THP_DISABLE(0x2a) 13:47:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x7, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 247.199381] QAT: Invalid ioctl 13:47:05 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4020940d, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 247.266467] QAT: Invalid ioctl [ 247.570305] IPVS: ftp: loaded support on port[0] = 21 13:47:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$tipc(0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x3f, 0x4) recvmmsg(r0, &(0x7f0000009ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = getpid() capset(&(0x7f0000000100)={0x19980330, r1}, 0x0) 13:47:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r5 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r5, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r4}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000001c0)={0x10000000}) 13:47:06 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x402c5342, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:06 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f00000000c0)={0x8}, 0x8, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000001640), 0x4) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mlock2(&(0x7f00003f5000/0xf000)=nil, 0xf000, 0x0) pipe2(&(0x7f00007f2000), 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, &(0x7f0000000080), 0x1, 0x3) 13:47:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x8, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:06 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40086410, &(0x7f0000000100)={0x2d, &(0x7f00000000c0)="5ac07167d2a483151988ec5b272d477ea81c544c38788d80d5e6db1e1ae822535e41e6b8f6f62d500bcda97a0e"}) read(r0, &(0x7f0000000380)=""/100, 0xffe4) fcntl$setlease(r0, 0x400, 0x0) [ 248.798040] QAT: Invalid ioctl [ 248.809332] QAT: Invalid ioctl 13:47:06 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x402c5828, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x9, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:06 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x402c582a, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x800000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x10000) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000002c0)) r1 = syz_open_pts(0xffffffffffffff9c, 0x40) ioctl$KDMKTONE(r1, 0x4b30, 0x3) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) r3 = accept4(r2, &(0x7f0000000300)=@can={0x1d, 0x0}, &(0x7f0000000380)=0x80, 0x80800) connect$vsock_stream(r3, &(0x7f00000001c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) write$tun(r2, &(0x7f0000000200)={@void, @val={0x2, 0x80, 0x5, 0x408, 0x6}, @ipx={0xffff, 0x1e, 0x1, 0x5, {@broadcast, @current, 0x45}, {@broadcast, @random="264b9599f8dc", 0x4}}}, 0x28) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000003c0)={r4, @multicast1, @remote}, 0xc) getsockopt$inet_udp_int(r2, 0x11, 0xfffffffffffffffd, &(0x7f00000000c0), &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000500)={"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"}) bind$netlink(r5, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) socket$inet6(0xa, 0x3, 0x7) sendmsg$nl_generic(r5, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfdffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x6000000, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 13:47:06 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x802) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) r2 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000f9dff4)) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) fstat(r0, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="bc1b6f048ddac200f0ba3ba15400000000"], 0x29a, 0x0, &(0x7f0000fedffe)}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) r4 = semget(0x3, 0x2, 0x100) semctl$IPC_RMID(r4, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000000100)}) 13:47:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) 13:47:07 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x404c534a, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 249.172768] QAT: Invalid ioctl [ 249.174632] binder: 13084:13090 ioctl c0306201 20008fd0 returned -14 [ 249.183651] QAT: Invalid ioctl [ 249.206923] binder: 13084:13090 got transaction to context manager from process owning it [ 249.269440] binder: 13084:13090 transaction failed 29201/-22, size 0-0 line 2887 [ 249.328703] binder_alloc: binder_alloc_mmap_handler: 13084 20000000-20002000 already mapped failed -16 13:47:07 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40505330, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xb, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:07 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x402c582a, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 249.598633] binder: undelivered TRANSACTION_ERROR: 29201 [ 249.652684] syz-executor.3 (13094) used greatest stack depth: 22960 bytes left 13:47:07 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40505331, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xc, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r5 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r5, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r4}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000001c0)={0x10000000}) 13:47:07 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x40) ioctl$BLKBSZSET(r1, 0x40041271, &(0x7f00000000c0)=0x6) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000180)={0x6, &(0x7f0000000100)=[{}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f00000001c0)={r2, 0x20}) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) 13:47:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x800000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x10000) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000002c0)) r1 = syz_open_pts(0xffffffffffffff9c, 0x40) ioctl$KDMKTONE(r1, 0x4b30, 0x3) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) r3 = accept4(r2, &(0x7f0000000300)=@can={0x1d, 0x0}, &(0x7f0000000380)=0x80, 0x80800) connect$vsock_stream(r3, &(0x7f00000001c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) write$tun(r2, &(0x7f0000000200)={@void, @val={0x2, 0x80, 0x5, 0x408, 0x6}, @ipx={0xffff, 0x1e, 0x1, 0x5, {@broadcast, @current, 0x45}, {@broadcast, @random="264b9599f8dc", 0x4}}}, 0x28) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000003c0)={r4, @multicast1, @remote}, 0xc) getsockopt$inet_udp_int(r2, 0x11, 0xfffffffffffffffd, &(0x7f00000000c0), &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000500)={"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"}) bind$netlink(r5, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) socket$inet6(0xa, 0x3, 0x7) sendmsg$nl_generic(r5, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfdffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x6000000, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 13:47:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xd, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 249.901450] QAT: Invalid ioctl [ 249.910902] QAT: Invalid ioctl [ 249.933123] QAT: Invalid ioctl [ 249.958887] QAT: Invalid ioctl 13:47:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) 13:47:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) 13:47:07 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4058534c, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 250.210269] QAT: Invalid ioctl [ 250.225807] QAT: Invalid ioctl [ 250.236136] QAT: Invalid ioctl [ 250.247188] QAT: Invalid ioctl 13:47:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xe, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 250.317196] syz-executor.3 (13238) used greatest stack depth: 22704 bytes left 13:47:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) 13:47:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) 13:47:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) 13:47:08 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40605346, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 250.493005] QAT: Invalid ioctl [ 250.509329] QAT: Invalid ioctl [ 250.520112] QAT: Invalid ioctl [ 250.541989] QAT: Invalid ioctl [ 250.559720] QAT: Invalid ioctl [ 250.573344] QAT: Invalid ioctl 13:47:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x10, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) 13:47:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) 13:47:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) 13:47:08 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x80400, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x90010, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x25}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@obj_role={'obj_role', 0x3d, 'wlan1$)@vmnet0%[-'}}, {@permit_directio='permit_directio'}, {@dont_hash='dont_hash'}]}}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:08 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x408c5333, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:08 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40a45321, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r3 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r3, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) [ 250.863422] QAT: Invalid ioctl [ 250.874639] QAT: Invalid ioctl [ 250.892227] QAT: Invalid ioctl [ 250.905984] QAT: Invalid ioctl [ 250.935441] QAT: Invalid ioctl 13:47:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) 13:47:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x11, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) prctl$PR_GET_SECCOMP(0x15) 13:47:08 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40a45323, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:08 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r2 = accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r2, 0x8, 0x0) [ 251.151499] QAT: Invalid ioctl 13:47:09 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40a85321, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 251.210669] QAT: Invalid ioctl 13:47:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x12, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 251.233180] QAT: Invalid ioctl [ 251.257072] QAT: Invalid ioctl 13:47:09 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) 13:47:09 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000040)={0xab8}) clone(0x20282000, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:09 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r2 = accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r2, 0x8, 0x0) 13:47:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r3 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r3, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) 13:47:09 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40a85323, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x13, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:09 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) 13:47:09 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40bc5311, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:09 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r2 = accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r2, 0x8, 0x0) 13:47:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r3 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r3, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) 13:47:09 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) 13:47:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x14, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:09 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 13:47:10 executing program 2: r0 = userfaultfd(0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, r0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:10 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x80045300, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0x15, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:10 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) 13:47:10 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r2 = accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r2, 0x8, 0x0) 13:47:10 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) 13:47:10 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x80045301, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:10 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:10 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) 13:47:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xc0, &(0x7f00000009c0)}, 0x10) 13:47:10 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) 13:47:10 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0105303, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:11 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r1 = syz_open_dev$amidi(&(0x7f000000a700)='/dev/amidi#\x00', 0x81, 0x40400) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f000000a740)={0x0, 0x1000, "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"}, &(0x7f000000b780)=0x1008) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f000000b7c0)=@sack_info={r2, 0xfffffffffffffff9, 0x8}, 0xc) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x20000ca2, &(0x7f00000009c0)}, 0x10) 13:47:11 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0189436, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:11 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:11 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) 13:47:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) 13:47:11 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:11 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:11 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc020660b, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x70) 13:47:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 13:47:11 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:12 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xa}) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:12 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc02c5341, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x20000dd0) 13:47:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) 13:47:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) pkey_alloc(0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:12 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0305302, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) 13:47:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:12 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc04c5349, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:13 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:13 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x4000, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000140)=0x400, 0x4) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000480)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="9500800000000000950000000000f48873eeffcf3c773800fcffffff"], &(0x7f0000000040)='GPL\x00', 0x80, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xd}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0xc4, "b07a64497fa994af8062c0d90de9a9f02358b9084266b82b132048556596df204f3ce4a28e1696acb8f4791470a1d27a215c56002ea614b9cb2a73ca90c718e9e9d34c50fa6ef902650bfb02a3f890818c0bb12093e730debf0fe896c57baa9cb026644fb6f7cb5f6ca76be0c67c9d309d660b53ec6abdc249bdbb7143fbee1349a2d130af53239e2c5e5b97914b2658d32f496497e83303f1d61e98f74511de9007709bf7f7d7691a69a63c75f7e6613c5b2830a308d0b6341c3d69d0c67be5fe08117e"}, &(0x7f0000000280)=0xcc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r2, @in={{0x2, 0x4e23, @local}}, 0x800}, 0x88) 13:47:13 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0505350, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:13 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:13 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc058534b, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1f, 0x29a, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_INPUT2(r1, &(0x7f0000000140)={0xc, 0xc1, "ec78814e7914e1cb4ed26dca1b3994ff9aa7433bb8eed1868450d3a6c3f7e11b52b632bb3aeb3057ff6d8a1ff722e42b9a04995edd95641df26f68bf3acf0f2ca38e1d76e5899b69a940cd34a787b8dd1b8ca36e36a9be7d6a929b6e762c1a658e6fabfc81d43893aecce92b05cbb4a91b24ebcb8292ccd871951438b7c46d63c018f8fed8de47e339c8916eabf060b672a9b336decefe2be714c797d6b136b20c0c1f5e386b2fcef41347e980c292b1ed4cdb2c9665363fa6043c3c4f649256de"}, 0xc7) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1f, 0x80000) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r2, 0x0, 0x8, 0x1ff, 0x2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="0d7a55aec7", 0xc35c69bc0c9e65fc}], 0x1, 0x0, 0x2e6}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:13 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:ld_so_cache_t:s0\x00', 0x23, 0x3) 13:47:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc058534f, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:14 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) pkey_alloc(0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2000000000000079, &(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x800000000, 0x1}, 0xfffffffffffffd75) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) 13:47:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x6, 0x2, 0x3}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000009500511bb24894561fcc6c2a1d44eaf2500000000000003448b88214c6abb483d1e0e91ec25a0b4f07b9f8e57b7c27ae00bc20506ecb06bd21b507ed2072148db9ae1f75d49288eb8c10cf127bd2b9044344badaf2a5eb596937535032be308b8eb42e9e2b8e487c39cbb811ce33211686da8c5db10c8be975c87473ec3f9e3d5fee9789a361be0a174b1939b2b6a0b2871e14530d5362ac635121cf26ddb25fd5ad1e"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r1, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc05c5340, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0xe}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x28000, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0xc0100, 0x0) linkat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00', 0x1000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000540)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x2, @mcast2, 0x1000}, @in={0x2, 0x4e20, @rand_addr=0x3ff}], 0x3c) fcntl$setpipe(r1, 0x407, 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000040)={0xc2af, 0x1}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000280)="c82d7f3ec0741a1adb544920cf20c74a6239e03abca3dd29da1d9bd02233d3e80d412b26a24678acc9a23300a285873515239815e3ccc522487c89afc5cb4d836bf4c0894f044f527de7cbba6c915f874a24bac7b9a0c646bd2561b35408e6a025cb075b4d204640d3f2a5b8e7acd6a6befcecca6eff8ed621d7950c00aece26d87acd5bdb97fc1b31bfaa9707c26ba5cccb0909c37a942e7992e046d92bfe0fbfe8e51850c17c31e8e2b37e701fab4bbd042eabc326ea89aecb0fc7186a558c1940a8fc0dc8", &(0x7f0000000400)=""/219}, 0x18) r3 = fanotify_init(0x0, 0x9001) read(r3, &(0x7f0000000600)=""/100, 0x64) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000500)=0x4) 13:47:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0605345, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) pkey_alloc(0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ptrace$poke(0x4, r1, &(0x7f0000000040), 0xedc) 13:47:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc08c5332, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:14 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x10000, 0x100000001}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000000540)=ANY=[@ANYRES16=r0], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000000000), 0x2000000000000189}, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x4) 13:47:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:15 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc08c5334, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:15 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:15 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) syncfs(r0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xd0, 0x800) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 13:47:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:15 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc08c5335, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18d500000000001000000003009f09255a1200c27b77f75c"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x40000) write$P9_RFSYNC(r1, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$update(0x2, r2, &(0x7f0000000100)="8b402b25fcfa94c173504d7708bf5f37db848517a8d954dbefa4c063678b59aa6a74c4546c62599b96d36073a8320d70e45bfc6ca762a2f2abe7367d5b490390b5161d42f5ae23e2670e2a127e318119718e40d80cf12912b2a95fe1", 0x5c) write$FUSE_GETXATTR(r1, &(0x7f00000003c0)={0x18, 0x0, 0x2, {0x4}}, 0x18) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000480)=[@text32={0x20, &(0x7f0000000400)="26f42a39c4e1755c2a0f20d835200000000f22d80f06f010bf0f000000c744240000700000c744240200100000c7442406000000000f011c24c4c34569910d000000000f060f005c6c00", 0x4a}], 0x1, 0x40, &(0x7f00000004c0)=[@cstype0={0x4, 0xb}, @dstype0={0x6, 0xd}], 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x2, {0xa, 0x4e21, 0x5, @rand_addr="82801bf0e2369467f35d39279a367885", 0x4}, r3}}, 0x38) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000180)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 13:47:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:15 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc08c5336, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:15 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f6357812b525b215e4a1ca97aa9a4e68b20acfac5a0a58d748955cbf942f9172f0f8bc5cf7e2709ff8ea735e9c4f0c80d0229de490e53ab4f35d1361201779cd002282dea99f2bfa42844da1398ad93deda60f70dfac"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x900) ioctl$PPPIOCGIDLE(r1, 0x8008743f, &(0x7f00000000c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r2 = semget(0x2, 0x2, 0x1) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f00000001c0)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0x0]) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xa) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f00000004c0)={{0x5, r3, r4, r5, r6, 0x1c, 0x1}, 0x2, 0x2, 0x1f}) 13:47:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:15 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0a45320, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:16 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0a45322, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:16 executing program 2: r0 = userfaultfd(0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x103000, 0x0) setsockopt$inet_int(r1, 0x0, 0x2f, &(0x7f00000000c0)=0x7fb, 0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00004b7000/0x4000)=nil, 0x4000}, 0xfffffffffffffffe}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1, 0x0, 0x8c}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:16 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0a45352, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:16 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0a85320, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000a37263f2efa99424941adfe41a9b763a578d801bb1faaa434cd5728a51028df69861bd7c2762f755fe8c861bac1b12"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:17 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x8}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:inetd_child_exec_t:s0\x00', 0x28, 0x2) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000200)) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) seccomp(0x1, 0x1, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{0x8, 0x200, 0x5, 0x10001}, {0x2, 0x80000001, 0x401, 0x4}, {0xb35a, 0x101, 0x0, 0xbce}, {0x3, 0x7f, 0x72, 0xfff}, {0x9d9, 0xa284, 0x7, 0x9}, {0xcf2f, 0x3, 0x3f, 0x5}]}) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000240)={0x1, 0xfff}) 13:47:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:17 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:17 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0a85322, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000140)=0x7) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000080)={@rand_addr, @multicast1}, &(0x7f00000000c0)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0xffffffffffffffcf) 13:47:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:17 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0a85352, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = dup3(r0, r0, 0x80000) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000000)={0x6, {{0xa, 0x4e24, 0x401, @remote, 0xfff}}}, 0x84) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r2 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x5000) shmdt(r2) 13:47:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:18 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101800, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r1, @ANYBLOB="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"], 0x19c}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000000) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x400000000000, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) 13:47:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0bc5310, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0xc0bc5351, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 13:47:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x600402, 0x0) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000040)) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xb00, 0x238000) 13:47:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:19 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b8000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:19 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x37}) 13:47:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000095000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) tee(r0, r0, 0x2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0xfffffffffffffff7}, &(0x7f0000000100)=0x8) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000140)={0x2, 0x9e, "73fb7a8bd33650406e1b310fbf5a5e86cfb6318c68efa9f7fcbd1404764feb2d3cee4698b36ae7daac71c8e053b3d10e2941ba26875ef662a2dbaa9c625b78d1ed8f6361264690499b207c080f65360f912adbe9e71d86f456c1f140146fb5ccb2daf8b168cb49f2b6a501a8f0b9a8f010a192aa1b4733fc54c6c61ab03d5373e8b01bdccc92791411c72a75de92efb2f6e934f8b517b406794b1c7f4817"}) 13:47:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:19 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x1f00}) 13:47:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:20 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x3700}) 13:47:20 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) clone(0x10000000, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x200001, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xfe93}, 0x10) 13:47:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18190ae4548cc900f561c8c60000000000000000000000001c927799298f9a8bc6bc71efa2ddbf4d261b318f729faeadf84829c34bb015641291760c4d56fceca04542868d8834d4d167a63840082fa3a91f7117bddb3d4cbbf175e9d6f4fff3c4dd65ecce77692903e602bad16bcd71a6ed84e1"], &(0x7f0000000100)='GPL\x00', 0x1, 0xfb, &(0x7f0000000000)=""/251, 0x40efd}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:20 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x1f000000}) 13:47:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:20 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x37000000}) 13:47:21 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x240) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) 13:47:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:21 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0xfdfdffff}) 13:47:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000001000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:21 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0xfffffdfd}) 13:47:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:22 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f00000000c0)=""/100, 0x28f) 13:47:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000020000000cbb033328d7406cedfbf69574c2bbe55e0c8005ad3de2"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:22 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x1f00000000000000}) 13:47:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) getpid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vfio/vfio\x00', 0x600000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0x19c, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc6e7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}]}, @TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaffc}]}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x326}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1716}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x700000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc1db6e37a7937db6}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r3, 0x700, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @media='eth\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x41}, 0x400c885) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:22 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x3700000000000000}) 13:47:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:23 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7, 0x4000) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x9, {{0x2, 0x4e20, @multicast2}}}, 0x84) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x40, 0x2000) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:23 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0xfdfdffff00000000}) 13:47:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x100000000, 0x1) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000040), 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000000000), 0x2f1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:23 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0x20, 0x8) lsetxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) write$binfmt_aout(r1, &(0x7f0000000100)={{0x10b, 0x3, 0x3, 0x1af, 0x29b, 0x2000000000000, 0xf5}, "86a667cc2819bddaf8a5188304b2e233c6f6bb"}, 0x33) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080)=0x7, 0x4) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000200)=""/182) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) fsetxattr$security_ima(r0, &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000400)=@ng={0x4, 0x13, "4823c5af95b3e25a990ba7a5713d76ec54"}, 0x13, 0x3) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f00000000c0)=""/1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r1, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:23 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x37}}) 13:47:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:24 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e05411, &(0x7f0000000180)=""/191) 13:47:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:24 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x1f00}}) 13:47:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000a000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfffffffffffffdca, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffff00, 0x202) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000840)=0x0) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() sendmmsg$unix(r1, &(0x7f0000000980)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000280)="a35177c866200313e5a074f4a0ccf45e14f057a77d2474", 0x17}, {&(0x7f0000000440)="7486e017f509ee8780fe0e4a850bc1e8d9638b7ba89cbf5f85408c108a3f9ee645da186f43a5b6d8711eb680a3b4f70c0c01e16827dc743ee952f24476fc90fcf443b89fee628a8f1346bf30bdbe5902eff3a01e4df1607090a2406af123bcafed2dbd2cafabb4cdb82027f47931eee0127f2191093508a05b2f66bdc143824a817f0aad96ab3c7ed04ba6f8ff4d8f7f2a26abfdc99f6e8cff0a6b2886f385ce079fdc7135f429d51ce16376", 0xac}, {&(0x7f0000000500)="1671a615c6a903c902414dd1fdf98920414d5fc4176233029613c29b817045c5233cf5ffe2d600358a19f70c0d5319312aa8261ef7a1d84994b3857015a64c0e47ef9c98443c577f707a90864018a82c69a527d7d493eb1af5e762cf336fed56278f73261b7d7548b90263ec3dbb59c6ae7cd5835c765fb57fdcd7", 0x7b}, {&(0x7f0000000580)="fc9c9b6f9231d3a0c0dfe11f102ab0c9c67aa7a1bfe43b02328419af27c9de98770073b2c94c05e626a3691de1b68d952046918ed3b10192ab36b644318a32238bedcfa2201db598e9e211c3f43746a7fa9706aeb07687fe9fccb995117f6c", 0x5f}, {&(0x7f0000000600)="0f25311ecfc885360148e662c32122d11d0fe414544d05bfc3b7263f76a2007601bd1f4440a9ac5ddc57318c4421ba1c7b6b59ef06f9fbc5e75ef6a3a3e322086762369c88ba7f3fddcbb1b50b1d5ea0f351683d571ebd803a3d4dc5f626265ceac4420a6b68fc11a16d7bdeadc6846ac69cc5cb67b597eff440e93f0cc5989dd47e4b26892d5c8c5354a10672040591375b76943c7b174f341f867b99cf18d43125d3944c074f2ec9321d546a82c89d577ea147e2eb441156aa86302ec3ae67ef9c428bd99a1722dbc12d4b3e7a5c2374fa93e0410ed4ad24682b2b3c9956081ff4194f5a9e520a", 0xe8}, {&(0x7f0000000700)="411572c17233a9ba90605b4fc2542f7974dbfb9f07a40890189d6372ddb60c8755f669d7cddc53ddd00d325314494807161f817b24c010b0036245ad764f66f891319a5faf642e7a4bf4eb5e7915fc7e2505760f9a2efa8debf93b029b2017c4b365e7656d8ae76de33233f6fd102872a9b559addecb1afc6506f78c498044a8764beaacf4638aa0b4406091d22e82d0f1910f429bdc6cb18c756a7f9a304211e63995e6d9ea34426388bd2ff29f16f02377b7ca29ce2c5b586b3cb0a1682b2b94ceb301427c5844ca352450e3e24fa3", 0xd0}], 0x6, &(0x7f0000000940)=[@rights={0x14, 0x1, 0x1, [r0, r0]}, @rights={0xc}, @cred={0x18, 0x1, 0x2, r2, r3, r4}], 0x38, 0x20000000}], 0x1, 0x800) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) r6 = dup3(r5, r5, 0x80000) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffed1, &(0x7f0000001200)=[{&(0x7f0000000040)="0d7a55aec7", 0x29b}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x25}}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000a40)={r7, 0x6}, &(0x7f0000000200)=0xfffffffffffffef4) 13:47:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:24 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x3700}}) 13:47:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000040)="31e2645a2a3da17546a963edcb1ad0e88c8dddd566ee6d694b7fa69fe2b733d5bd322bfe95ab40c70cb294c1b2950d7c64ba80f12ab4bd872e51") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:25 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x1f000000}}) 13:47:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000080000000000000000008bb31329630fb36cf7592bb063cacb769f845f68b35cbd72acaedb02e50b20cb65001a60100000000000000cfe15decbd6e2a5f0e14124b2bbd06355cb886702f67f827e6b5c95c9e4e3c21d1ca1d08fd0dbe50ccfb40d558bd7a376ab27628bdebdeb5f022baf40feb06bf62af323236f1505d2e50fa7f2156"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:25 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000042c2ec5a9ed2c6c98569003d"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f00000000c0)={0x401, 0x0, 0x10001, 0x8000000000000000}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40086436, &(0x7f0000000100)={r2, 0x6}) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)={0x0, 0x0}}, 0x10) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r1, 0x0, 0x15, &(0x7f0000000200)='trustedbdevvmnet1GPL\x00', r3}, 0x30) r5 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0186405, &(0x7f00000003c0)={0xaa4, 0x1000, r4, 0x0, r5, 0x0, 0x1, 0x8}) rt_sigaction(0x19, &(0x7f00000001c0)={&(0x7f0000000140)="660f3a0ecaa43edee9dbdcdbeff0311667f26dc4c1a567570ec4e13ddf43bf660f38069c0703000000c4e35d38f308", {0x4}, 0x1, &(0x7f0000000180)="0f1124dcdcdbf30f0db6000000006564650ff239eb04f20f38f16900d0cd0f014900745dc4c3a55e770d00"}, &(0x7f0000000280)={&(0x7f0000000400)="8fc8188639bbc4c17d62d76667f2f664c7c4c15971f12bf00fc1a0148000007b00c4e2019dbd0600000064f30fbda91b1800000f01566bc4e3bd7c8d0210000000", {}, 0x0, &(0x7f00000004c0)="12990a71918ff30f01c2f30fbc60b2f26664f20f419384790000f3abc4c27d8e03dee6f08059fe00c4e291099b702151210faef0"}, 0x8, &(0x7f0000000480)) 13:47:25 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x37000000}}) 13:47:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x5, 0x800) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0086418, &(0x7f0000000080)={0x7, 0x1, 0x200, 0x7, 0x1, 0xfff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:26 executing program 2: r0 = userfaultfd(0x807fc) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0xfdfdffff}}) 13:47:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:26 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0xc840, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e21}}}, &(0x7f0000000480)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000004c0)={r1, 0x2, 0x36, "8906fa20c978c401c421b6e50bcba3b18ff750f379ac24946c74024b1ce078ea7ffd4d2649b7a2d766e4699f34489cd6f273a211f971"}, 0x3e) setsockopt(r0, 0x4, 0x8, &(0x7f00000000c0)="c7c508558df5a19ed84a97c183f1e5b2b554740beeb169006b5cd358548699f8a285cd9fedd4c5b75e3b6ca1fd4437c4db611197fc8194f77d4fe307edb0259bef19ef2f1af784346b765b596e7d002985704d5a206378e8248d001c317d339c712b7e0cbdf7cc42f078019cb08d8bf2e8ee295bc7700d889e95570c3a7f2108a04924278eb8882f6739972a19450469a1fe2066fae5becf4f1dfae0adabd117eaa0135d2781cd2614daa9f2b490cea7c959bee18ae8bbc15d24754c9fc20242cfbd0c8f45ecb4163d50abc56a36b37d33f4a6a5ad4ec643c33b165f6671cc6161ae4113824e6859a817819b8bc80a6ad5", 0xf1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000001400100000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x40) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x10003, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000040)="56092f35216664bc0bf60ba187a98618", 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r2, 0x2e2, &(0x7f00000009c0)}, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f0000000500)=0x101, 0x4) getpeername$unix(r3, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) 13:47:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:26 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0xfffffdfd}}) 13:47:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7fff, 0xc02) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f00000000c0)={r2, 0x1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:26 executing program 2: r0 = userfaultfd(0x3) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000440)=0x9, 0x2) r3 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x3, 0x210000) ioctl$IMGETVERSION(r3, 0x80044942, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x80, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000200)=""/234) fchown(r0, r1, r4) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b5000/0x4000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:26 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x1f00000000000000}}) 13:47:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) 13:47:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x3700000000000000}}) 13:47:26 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x8, 0x80000) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x0, 0xc46f}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$peek(0x1, r2, &(0x7f00000001c0)) read(r0, &(0x7f0000000380)=""/100, 0xffe4) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40000, 0x0) r4 = add_key(&(0x7f0000000340)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000240)="d04a8ef7ae38d1d8926e80acd3bf072728ef3652fecc0769ccf6e8c40d38ca121780b7bafaf64a36a9d9e3175c11", 0x2e, r4) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r5) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f00000000c0)=0x5) 13:47:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)={0x4, [0x3, 0x5, 0x5, 0x9]}, 0xc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "8d7be4470ca40962a70490b35f450abf19020569"}, 0x15, 0x2) 13:47:26 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:27 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0xfdfdffff00000000}}) 13:47:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) r2 = semget$private(0x0, 0x3, 0x300) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000080)={0x0, 0x2, 0x9, &(0x7f0000000040)=0x7}) sendmsg$kcm(r1, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f80), 0x1, 0x0, 0xfea5}, 0x0) r3 = getpgid(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000f80)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001040)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001000)={&(0x7f0000000fc0)={0x34, r4, 0xc02, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1, 0xfffffffffffffffe, @l2={'ib', 0x3a, 'tunl0\x00'}}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000001}, 0x80) r5 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, r1, 0x0, 0x4, &(0x7f0000000600)='GPL\x00'}, 0x30) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000a40)) fstat(r1, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getpgrp(0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000e80)={r1}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}}}, &(0x7f00000008c0)=0xe8) r12 = getgid() r13 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000a00)=0xe8) r15 = getgid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a80)={0x0}, &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0}, &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80)=0x0, &(0x7f0000000bc0), &(0x7f0000000c00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, r1, 0x0, 0x22, &(0x7f0000000c40)=']+keyring*\'+#(selinuxwlan0trusted\x00'}, 0x30) r20 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, &(0x7f0000000d00)=0xc) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000ec0)={0x18, 0x0, {0x4, @random="ab0db33a873d", 'syzkaller1\x00'}}) sendmsg$unix(r1, &(0x7f0000000e40)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="a46ce2b94785e38113a009cee3fab7e144eeb90dcc826d2526bada782ea9f006ce6e2431fd29297e6fb50c39e8ecb66c4f49a694068e12ee6e920bdb7d62262812e70c898de54d1a9ed35f32a9c69572cd350b83d53713f062af72bc91e486452d0b034865d3e0d15a26b86beb1af00a7991e207b1cd9801c94dcdd3f514f5fa0301ec6b7b9bad08a4552c468e458439587976efa0d1d456e325baa1341b191e8197b9b0b4f0462fef4addcd950874d990", 0xb1}, {&(0x7f0000000240)="2f1fe5fc79546ca4e6463dcda11a7955971ad536", 0x14}, {&(0x7f00000003c0)="6d1a747bb5639a71d8cf4d0cef9ef725b8c1210e385b93bd2f0d1d284731fabe1779e8f7b3e71eb1f791c9b9d6889bfc0125a31fa270bdb9ed41526e474a5f013cbdf32d7063336432adc032071580140c19ffda2fcbc4ec0634153a0ffd8c9f431762f28cddc1e2c643f79b09302d4100b09c52c9729c0de5b913bc50", 0x7d}, {&(0x7f0000000440)="a8cdcdf5fc0f4b9a9aefbf15e636bc91bffa711c5411e37d5a858403745b5cdcf32827669a49fc90444c574379ac16db08b02ceb2df316ca2e2827398e5c173f3e11", 0x42}, {&(0x7f00000004c0)="401b82491900e2752e57dceb3bb8ed92b723c67e9b569d5aaf5ab235867b27bd27e33ebd4068508b3aaf64dfd3fe6ea8941507a899553f4015bc7adad0888b5d2e24db53a57b4adec429c6802396c165e666862c6fd5846b3e0a78c39decfdff44bd816ab201f614be8dc2642aa3370833ade5773477c171b76477d869d490a381", 0x81}], 0x5, &(0x7f0000000d40)=[@cred={0x18, 0x1, 0x2, r3, r5, r6}, @rights={0x28, 0x1, 0x1, [0xffffffffffffffff, r1, r1, r1, r0, r1, r0]}, @rights={0x14, 0x1, 0x1, [r1, r1]}, @cred={0x18, 0x1, 0x2, r7, r8, r9}, @cred={0x18, 0x1, 0x2, r10, r11, r12}, @cred={0x18, 0x1, 0x2, r13, r14, r15}, @cred={0x18, 0x1, 0x2, r16, r17, r18}, @cred={0x18, 0x1, 0x2, r19, r20, r21}, @rights={0x30, 0x1, 0x1, [r1, r1, r1, r1, r0, r1, r1, r1, r1]}], 0xfc, 0x81}, 0x80) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1, 0x10000) 13:47:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:27 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:27 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0x37}}) 13:47:27 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:27 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x80404c0) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="8d00c8890000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) acct(&(0x7f0000000100)='./file0\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r2, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:27 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:27 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:27 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0x1f00}}) 13:47:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x161802) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1f, 0xa, &(0x7f0000000040)=@raw=[@ldst={0x0, 0x0, 0x3, 0xf, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff}, @alu={0x7, 0x6000000, 0x7, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x81}, @call={0x85, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xb67, 0x0, 0x0, 0x0, 0x3}, @exit, @map={0x18, 0x3, 0x1, 0x0, r1}], &(0x7f00000000c0)='GPL\x00', 0x200, 0x41, &(0x7f0000000100)=""/65, 0x41100, 0x1, [], r2, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:27 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:27 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0x3700}}) 13:47:28 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:28 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000100000000b800004000000000eb160db9da0a8300442ad413590d5f5ab5f8e495d85fc38fea8e578f5ca0740b466811604cc367f88f141af5cbe7f5c30000000000000017c35679905ae15cc2e37e79aee7812891e0a76ed38f852d40cc034e7401b68c264fdae82ce3434f9147106f17762dc316b79fcb801aeab908a5a9f070c0"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000080)={{0x5, 0x7, 0x4, 0x68d61679, 0x5dd7, 0x747}, 0x1}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040)={0x20}, 0x1) 13:47:28 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0x1f000000}}) 13:47:28 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)={0x200000006}) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x82000) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b8000/0x2000)=nil, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x40}) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000200), 0x0, &(0x7f00000008c0)=""/200, 0xfffffffffffffd3f}, 0x10000) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc2c45513, &(0x7f00000005c0)={{0x5, 0x3, 0x10001, 0x8, 'syz0\x00', 0x5b2b}, 0x1, [0x0, 0x40000000, 0x3, 0x8, 0xffff, 0x0, 0x1ff, 0x0, 0x92, 0x2, 0x0, 0x4a, 0x5aac, 0x6, 0x8001, 0x7, 0x80000001, 0x3, 0xfffffffffffffff7, 0x0, 0x2, 0x4f, 0x9, 0x5, 0x2, 0x80, 0xfff, 0x9, 0x70, 0x10001, 0x6c, 0x45, 0x8, 0x5, 0x70, 0x1, 0x4, 0x7, 0x5, 0x6, 0x4b, 0x58, 0x0, 0x0, 0x8, 0x2103, 0xfffffffffffffffb, 0x2, 0x5, 0x1ff, 0x5, 0x1, 0x20, 0x5, 0x5, 0x272d, 0x7, 0x9d01, 0xfffffffffffff801, 0xf06, 0x80, 0x6, 0x5, 0x5, 0x0, 0x81, 0x0, 0x5, 0x9, 0x5, 0x8, 0x100, 0x568d, 0x10000, 0xf1e, 0x5bb8, 0xfffffffffffffffe, 0x9918, 0x1ff, 0x0, 0x80000000, 0x800, 0x9, 0x7, 0x7, 0x1ff, 0x7, 0x4, 0xfd, 0x8, 0x8, 0xad0, 0x7, 0x364, 0x7, 0x100000000, 0x9, 0x1, 0x4, 0x9, 0x1f, 0x4, 0x1ff, 0x7, 0x1f, 0x5, 0x1, 0x477, 0x2, 0x9, 0x1, 0x7, 0x10001, 0x5, 0x5, 0x7, 0x10001, 0x3be7, 0x7, 0x4, 0xf56, 0x2, 0x6, 0x7fffffff, 0xffff, 0x81, 0x6, 0x3482], {0x0, 0x989680}}) read(r0, &(0x7f0000000280)=""/100, 0xffffffffffffff73) 13:47:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:28 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xfffffffffffffffe, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp, &(0x7f00000000c0)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x6990, 0x1, [0x3]}, &(0x7f0000000140)=0xa) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="0900030041000300080072aefba9c50d82d243301c89abb9bc9b004cce4735555739968eda8b087c9bd463312b30153f2980c6738f81966f2d7fadf545a9345b281444aaa77a48f36c5b8e"], &(0x7f00000001c0)=0xe) 13:47:28 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:28 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0x37000000}}) 13:47:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xffffffffffffffff, 0x1b, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80010280}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x68, r2, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa79}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8a7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4040040}, 0x800) 13:47:28 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) 13:47:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:28 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0xfdfdffff}}) 13:47:29 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) 13:47:29 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0xfffffdfd}}) 13:47:29 executing program 2: r0 = userfaultfd(0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x100000000, 0x800) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x1d, &(0x7f00000001c0)=[{&(0x7f0000000180)="0d7a55aec7", 0x5}], 0x58}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x50, &(0x7f00000000c0)}, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x103000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x1) 13:47:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:29 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:29 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0x1f00000000000000}}) 13:47:29 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) 13:47:29 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0x3700000000000000}}) 13:47:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) pkey_alloc(0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:29 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 13:47:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1d, 0x200001b0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000000000000000000000000009500000000000000"], &(0x7f0000000040)='CPL\x00', 0x1, 0x434, &(0x7f00000002c0)=""/251, 0x40000000}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "ca819d", 0x8, 0x6, 0x0, @dev, @local, {[], @icmpv6=@echo_request}}}}}, 0x0) socketpair(0x2, 0x0, 0x2, &(0x7f0000000080)) 13:47:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:29 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {0x0, 0xfdfdffff00000000}}) 13:47:29 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x8000, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f000062e000/0x3000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:29 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) 13:47:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 13:47:29 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x37}) 13:47:29 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x1f00}) 13:47:29 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x3700}) 13:47:30 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x2}], 0x1, 0x0, 0xfffffffffffffcd6}, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x100000001, 0x20140) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0x2, 0x8, 0x1, 0x6, 0x35, 0x6}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x400000, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000100)={0x77359400}, 0x8) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x8000, @mcast1, 0x1}}, 0x9, 0x5, 0x7, 0x40, 0x4}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r3, 0x7}, &(0x7f0000000280)=0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000180)) 13:47:30 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) 13:47:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:30 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'veth1\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x22}}}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r2 = getpgid(0x0) sched_rr_get_interval(r2, &(0x7f0000000100)) read(r0, &(0x7f0000000380)=""/100, 0xffe4) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KDSETLED(r3, 0x4b32, 0x5) 13:47:30 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x1f000000}) 13:47:30 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:30 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xa4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r1, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="980000000000000000000000000000009500000040000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x84100) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r1}) setsockopt$inet_dccp_int(r2, 0x21, 0x15, &(0x7f0000000040)=0x401, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xfffffffffffffe7a, &(0x7f00000009c0)}, 0xc5) 13:47:30 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x37000000}) 13:47:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:30 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000009500000000000000e5ddf98bb6f7bc74629f2a23c0ba8b35"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:31 executing program 2: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) socket$caif_stream(0x25, 0x1, 0x5) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) r1 = getpid() ptrace$pokeuser(0x6, r1, 0x100, 0x3) 13:47:31 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0xfdfdffff}) 13:47:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:31 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) accept4$tipc(r0, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) 13:47:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000c00000000009500000000000000a9b5f2716bbe2d85124c527bf69b61273ae629027d79fcb547aa60be0e24100a78b1804c1daa2f9b71499c849e142d1f4b6cb23a6ec3dc8fdfb07a632c1fb02799935174a88d12b46b52130f1e1ddde18bd82f0cd4d830aa0dbeb6636e6dbd84a26c10a6846145e5c92012aab9409a265301c80d7647de3be67a027f9c2ca6fff12d4347ada0a789e15ebf33e7557d1d9d1dd06776c331cbc6931b506f75d2d3f68a32ed0b61748127d621"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) syz_open_dev$mouse(&(0x7f00000006c0)='/dev/input/mouse#\x00', 0x3f, 0x4000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x28040, 0x0) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000600)={0x4, 0xf, "36741fa8eba25e8531c76c425aaa50bcebba3dc17d78e265d77f6d747c9a42f5", 0xffff, 0x2, 0xfffffffffffffffa, 0x5b719a1c, 0x117}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) r3 = add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f00000003c0)="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", 0xfc, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$KEYCTL_PKEY_QUERY(0x18, r3, 0x0, &(0x7f0000000240)='/dev/sequencer2\x00', &(0x7f0000000280)) openat$userio(0xffffffffffffff9c, &(0x7f0000000680)='/dev/userio\x00', 0x101200, 0x0) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x10, 0x8, 0x6, 0x1e, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_sa={0x2, 0x1, 0x4d4, 0x1, 0xfffffffffffffffd, 0x33, 0x2}, @sadb_x_filter={0x5, 0x1a, @in=@local, @in=@rand_addr=0x4, 0x1f, 0x10, 0x10}, @sadb_x_sa2={0x2, 0x13, 0x1000, 0x0, 0x0, 0x70bd2c, 0x3507}, @sadb_key={0x11, 0x9, 0x3e0, 0x0, "73a8ddb87d4b264495020e036316dfd4f5ccc5d7623b0effd16e67ba3650f5207ffa95e0c89a48e0f795ecbbada0ff303d4e3b55d00e0076efd015b5e159727c1364111f35c2dc48c68ec21781c33bb63dbf08ba9702989d9406fb77d03af202602cc7ecfb78496d0d1690adb8cfac6d5aa939466799f3f90426a707"}, @sadb_ident={0x2, 0xb, 0x5, 0x0, 0x12000000}]}, 0xf0}}, 0x4) 13:47:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) 13:47:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:31 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0xfffffdfd}) 13:47:31 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40505330, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 273.992757] QAT: Invalid ioctl 13:47:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) r4 = accept4$tipc(r1, 0x0, &(0x7f0000000080), 0x80800) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000380)=""/239, 0xef) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x5ec, 0xb, 0x2204, 0x40000000}, 0x10) fcntl$setown(r4, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) [ 274.171217] QAT: Invalid ioctl 13:47:32 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f00000001c0)={0x8}) clone(0xc1010200, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x18) ioctl$RTC_AIE_OFF(r1, 0x7002) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x411ffd, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000180)) write$smack_current(r2, &(0x7f00000000c0)='\x00', 0x1) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:32 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:32 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x580, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x100, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000006c0)={@dev}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000880)=0xe8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x9, &(0x7f00000008c0)=@raw=[@exit, @map={0x18, 0x5, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x2, 0xb, 0x7, 0xfffffffffffffffc, 0x4}, @call={0x85, 0x0, 0x0, 0x46}, @call={0x85, 0x0, 0x0, 0x58}, @alu={0x7, 0x7, 0xf, 0x7, 0xc, 0x10, 0x8}, @map={0x18, 0x9, 0x1, 0x0, r1}], &(0x7f0000f6bffb)='GPL\x00', 0x40000000000001, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x80, [], r2, 0xf}, 0xffffffffffffff58) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r3, 0x2e2, &(0x7f00000009c0)}, 0x10) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000000)) 13:47:32 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x1f00000000000000}) 13:47:32 executing program 3 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:32 executing program 4 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 274.705457] FAULT_INJECTION: forcing a failure. [ 274.705457] name failslab, interval 1, probability 0, space 0, times 0 [ 274.720405] CPU: 0 PID: 14662 Comm: syz-executor.4 Not tainted 5.0.0-rc6 #67 [ 274.720593] FAULT_INJECTION: forcing a failure. [ 274.720593] name failslab, interval 1, probability 0, space 0, times 0 [ 274.727618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.748135] Call Trace: [ 274.750729] dump_stack+0x172/0x1f0 [ 274.754375] should_fail.cold+0xa/0x1b [ 274.758269] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 274.763375] ? lock_downgrade+0x810/0x810 [ 274.767534] ? ___might_sleep+0x163/0x280 [ 274.771691] __should_failslab+0x121/0x190 [ 274.775932] should_failslab+0x9/0x14 [ 274.779740] kmem_cache_alloc_node_trace+0x270/0x720 [ 274.784853] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 274.790399] ? _kstrtoull+0x14c/0x200 [ 274.794211] ? _parse_integer+0x190/0x190 [ 274.798370] __get_vm_area_node+0x12b/0x3a0 [ 274.802703] __vmalloc_node_range+0xd4/0x790 [ 274.807112] ? bpf_prog_alloc+0x6b/0x2b0 [ 274.811176] ? _kstrtoul+0x170/0x170 [ 274.814990] __vmalloc+0x44/0x50 [ 274.818361] ? bpf_prog_alloc+0x6b/0x2b0 [ 274.822426] bpf_prog_alloc+0x6b/0x2b0 [ 274.826320] bpf_prog_load+0x4fc/0x1490 [ 274.830308] ? bpf_prog_new_fd+0x60/0x60 [ 274.834391] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 274.839929] ? security_bpf+0x91/0xc0 [ 274.843742] __do_sys_bpf+0xdaf/0x3c10 [ 274.847649] ? bpf_prog_load+0x1490/0x1490 [ 274.851891] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 274.856740] ? check_preemption_disabled+0x48/0x290 [ 274.861777] ? wait_for_completion+0x440/0x440 [ 274.866373] ? __sb_end_write+0xd9/0x110 [ 274.870440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 274.875991] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 274.880752] ? do_fast_syscall_32+0xd1/0xc98 [ 274.885179] ? entry_SYSENTER_compat+0x70/0x7f [ 274.889774] ? do_fast_syscall_32+0xd1/0xc98 [ 274.894191] __ia32_sys_bpf+0x72/0xb0 [ 274.897997] do_fast_syscall_32+0x281/0xc98 [ 274.902327] entry_SYSENTER_compat+0x70/0x7f [ 274.906735] RIP: 0023:0xf7f56869 [ 274.910113] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 274.929013] RSP: 002b:00000000f5d520cc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 274.936721] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000100 [ 274.943990] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 274.951258] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 274.958545] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 274.965825] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 274.975268] CPU: 0 PID: 14669 Comm: syz-executor.3 Not tainted 5.0.0-rc6 #67 [ 274.982488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.991856] Call Trace: [ 274.994459] dump_stack+0x172/0x1f0 [ 274.998097] should_fail.cold+0xa/0x1b [ 275.001991] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 275.007095] ? lock_downgrade+0x810/0x810 [ 275.011245] ? ___might_sleep+0x163/0x280 [ 275.015397] __should_failslab+0x121/0x190 [ 275.019637] should_failslab+0x9/0x14 [ 275.023439] kmem_cache_alloc_node_trace+0x270/0x720 [ 275.028546] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.034086] ? _kstrtoull+0x14c/0x200 [ 275.037891] ? _parse_integer+0x190/0x190 [ 275.042049] __get_vm_area_node+0x12b/0x3a0 [ 275.046377] __vmalloc_node_range+0xd4/0x790 [ 275.050792] ? bpf_prog_alloc+0x6b/0x2b0 [ 275.054858] ? _kstrtoul+0x170/0x170 [ 275.058598] __vmalloc+0x44/0x50 [ 275.061970] ? bpf_prog_alloc+0x6b/0x2b0 [ 275.066029] bpf_prog_alloc+0x6b/0x2b0 [ 275.069919] bpf_prog_load+0x4fc/0x1490 [ 275.073905] ? bpf_prog_new_fd+0x60/0x60 [ 275.077984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.083515] ? security_bpf+0x91/0xc0 [ 275.087320] __do_sys_bpf+0xdaf/0x3c10 [ 275.091211] ? bpf_prog_load+0x1490/0x1490 [ 275.095442] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 275.100288] ? check_preemption_disabled+0x48/0x290 [ 275.105307] ? wait_for_completion+0x440/0x440 [ 275.109898] ? __sb_end_write+0xd9/0x110 [ 275.113960] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.119506] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 275.124264] ? do_fast_syscall_32+0xd1/0xc98 [ 275.128672] ? entry_SYSENTER_compat+0x70/0x7f [ 275.133252] ? do_fast_syscall_32+0xd1/0xc98 [ 275.137668] __ia32_sys_bpf+0x72/0xb0 [ 275.141470] do_fast_syscall_32+0x281/0xc98 [ 275.145805] entry_SYSENTER_compat+0x70/0x7f [ 275.150208] RIP: 0023:0xf7ff1869 [ 275.153575] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 275.172470] RSP: 002b:00000000f5ded0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 275.180173] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000100 [ 275.187436] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 275.194704] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 13:47:33 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x3700000000000000}) 13:47:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000002000000bd2c0552d58200000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x2000) [ 275.201969] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 275.209231] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 13:47:33 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0xfdfdffff00000000}) 13:47:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000001f00000000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 275.276892] syz-executor.4: vmalloc: allocation failure: 4096 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0-1 13:47:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:33 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x37}) [ 275.433559] syz-executor.3: vmalloc: allocation failure: 4096 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0-1 [ 275.467929] CPU: 0 PID: 14669 Comm: syz-executor.3 Not tainted 5.0.0-rc6 #67 [ 275.475146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.484510] Call Trace: [ 275.487105] dump_stack+0x172/0x1f0 [ 275.490743] warn_alloc.cold+0x87/0x17f [ 275.494732] ? zone_watermark_ok_safe+0x260/0x260 [ 275.499591] ? rcu_read_lock_sched_held+0x110/0x130 [ 275.504617] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.510166] ? _parse_integer+0x190/0x190 [ 275.514323] ? __get_vm_area_node+0x2df/0x3a0 [ 275.518827] __vmalloc_node_range+0x48a/0x790 [ 275.523329] ? _kstrtoul+0x170/0x170 [ 275.527053] __vmalloc+0x44/0x50 [ 275.530424] ? bpf_prog_alloc+0x6b/0x2b0 [ 275.534487] bpf_prog_alloc+0x6b/0x2b0 [ 275.538381] bpf_prog_load+0x4fc/0x1490 [ 275.542367] ? bpf_prog_new_fd+0x60/0x60 [ 275.546455] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.551992] ? security_bpf+0x91/0xc0 [ 275.555811] __do_sys_bpf+0xdaf/0x3c10 [ 275.559708] ? bpf_prog_load+0x1490/0x1490 [ 275.563947] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 275.568805] ? check_preemption_disabled+0x48/0x290 [ 275.573837] ? wait_for_completion+0x440/0x440 [ 275.578433] ? __sb_end_write+0xd9/0x110 [ 275.582507] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.588061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 275.592820] ? do_fast_syscall_32+0xd1/0xc98 [ 275.597232] ? entry_SYSENTER_compat+0x70/0x7f [ 275.601816] ? do_fast_syscall_32+0xd1/0xc98 [ 275.606233] __ia32_sys_bpf+0x72/0xb0 [ 275.610045] do_fast_syscall_32+0x281/0xc98 [ 275.614375] entry_SYSENTER_compat+0x70/0x7f [ 275.618795] RIP: 0023:0xf7ff1869 [ 275.622163] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 275.641064] RSP: 002b:00000000f5ded0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 275.648779] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000100 [ 275.656049] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 275.663314] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 275.670612] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 275.677889] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 275.685189] CPU: 1 PID: 14662 Comm: syz-executor.4 Not tainted 5.0.0-rc6 #67 [ 275.692396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.701737] Call Trace: [ 275.701760] dump_stack+0x172/0x1f0 [ 275.701792] warn_alloc.cold+0x87/0x17f [ 275.711950] ? zone_watermark_ok_safe+0x260/0x260 [ 275.713122] Mem-Info: [ 275.716829] ? rcu_read_lock_sched_held+0x110/0x130 [ 275.716863] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.716882] ? _parse_integer+0x190/0x190 [ 275.716902] ? __get_vm_area_node+0x2df/0x3a0 [ 275.719402] active_anon:116551 inactive_anon:2955 isolated_anon:0 [ 275.719402] active_file:7706 inactive_file:36699 isolated_file:0 [ 275.719402] unevictable:2 dirty:70 writeback:0 unstable:0 [ 275.719402] slab_reclaimable:11851 slab_unreclaimable:110555 [ 275.719402] mapped:58499 shmem:3016 pagetables:1942 bounce:0 [ 275.719402] free:1043580 free_pcp:562 free_cma:0 [ 275.724310] __vmalloc_node_range+0x48a/0x790 [ 275.724327] ? _kstrtoul+0x170/0x170 [ 275.724349] __vmalloc+0x44/0x50 [ 275.729962] Node 0 active_anon:466204kB inactive_anon:11820kB active_file:30692kB inactive_file:146796kB unevictable:8kB isolated(anon):0kB isolated(file):0kB mapped:233996kB dirty:280kB writeback:0kB shmem:12064kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 149504kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 275.734002] ? bpf_prog_alloc+0x6b/0x2b0 [ 275.734018] bpf_prog_alloc+0x6b/0x2b0 [ 275.734038] bpf_prog_load+0x4fc/0x1490 [ 275.738600] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 275.772468] ? bpf_prog_new_fd+0x60/0x60 [ 275.772500] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.772512] ? security_bpf+0x91/0xc0 [ 275.772529] __do_sys_bpf+0xdaf/0x3c10 [ 275.777085] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 275.780731] ? bpf_prog_load+0x1490/0x1490 [ 275.780748] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 275.780775] ? check_preemption_disabled+0x48/0x290 [ 275.780791] ? wait_for_completion+0x440/0x440 [ 275.784208] lowmem_reserve[]: 0 2553 2555 2555 [ 275.812703] ? __sb_end_write+0xd9/0x110 [ 275.812722] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.812750] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 275.816873] Node 0 DMA32 free:371332kB min:36232kB low:45288kB high:54344kB active_anon:466204kB inactive_anon:11820kB active_file:30692kB inactive_file:146796kB unevictable:8kB writepending:280kB present:3129332kB managed:2617972kB mlocked:0kB kernel_stack:8544kB pagetables:7768kB bounce:0kB free_pcp:2248kB local_pcp:1304kB free_cma:0kB [ 275.820703] ? do_fast_syscall_32+0xd1/0xc98 [ 275.820718] ? entry_SYSENTER_compat+0x70/0x7f [ 275.820732] ? do_fast_syscall_32+0xd1/0xc98 [ 275.820754] __ia32_sys_bpf+0x72/0xb0 [ 275.824809] lowmem_reserve[]: 0 0 2 2 [ 275.850507] do_fast_syscall_32+0x281/0xc98 [ 275.850527] entry_SYSENTER_compat+0x70/0x7f [ 275.850539] RIP: 0023:0xf7f56869 [ 275.850555] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 13:47:33 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x40) getpeername$unix(r1, &(0x7f00000000c0), &(0x7f0000000180)=0x6e) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = msgget(0x2, 0x100) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000400)=""/4096) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x377}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:33 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x1f00}) 13:47:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 275.854640] Node 0 Normal free:1532kB min:2076kB low:2080kB high:2084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:96kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 275.860116] RSP: 002b:00000000f5d520cc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 275.860130] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000100 [ 275.860138] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 275.860147] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 275.860155] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 275.860165] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 275.863990] lowmem_reserve[]: 0 0 0 0 [ 275.963291] Node 1 Normal free:3785548kB min:53624kB low:67028kB high:80432kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 276.028661] lowmem_reserve[]: 0 0 0 0 [ 276.057003] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 276.195946] Node 0 DMA32: 24*4kB (UME) 476*8kB (UM) 1612*16kB (UM) 1260*32kB (UME) 587*64kB (UM) 77*128kB (UME) 23*256kB (UME) 12*512kB (UE) 1*1024kB (U) 5*2048kB (UME) 57*4096kB (M) = 374208kB [ 276.254173] Node 0 Normal: 15*4kB (ME) 18*8kB (ME) 5*16kB (ME) 3*32kB (ME) 0*64kB 1*128kB (M) 0*256kB 0*512kB 1*1024kB (E) 0*2048kB 0*4096kB = 1532kB [ 276.274576] Node 1 Normal: 75*4kB (UE) 256*8kB (UME) 270*16kB (UE) 48*32kB (UM) 19*64kB (UME) 9*128kB (UE) 8*256kB (UME) 3*512kB (UM) 3*1024kB (UM) 2*2048kB (UE) 919*4096kB (M) = 3785548kB [ 276.291670] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 276.300616] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 276.309335] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 276.318175] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 276.326820] 47422 total pagecache pages [ 276.330916] 0 pages in swap cache [ 276.334372] Swap cache stats: add 0, delete 0, find 0/0 [ 276.339798] Free swap = 0kB [ 276.342812] Total swap = 0kB [ 276.345821] 1965979 pages RAM [ 276.348994] 0 pages HighMem/MovableOnly 13:47:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x3700}) 13:47:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000080)=0x48, 0x4) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'rdma'}, {0x2f, 'pids'}, {0x2d, 'pids'}]}, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x2, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 276.352965] 339412 pages reserved [ 276.356398] 0 pages cma reserved 13:47:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x3, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x1f000000}) 13:47:34 executing program 2: r0 = userfaultfd(0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000280)=0x1, 0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) mmap(&(0x7f00004b8000/0x2000)=nil, 0x2000, 0x1000003, 0x28010, r0, 0x0) r3 = socket$inet6(0xa, 0x80007, 0xfffffffeffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x4, 0x800, 0x200, 0xdc46, 0x10000, 0x3, 0xffffffff80000001, 0x3, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000001c0)={r4, 0x2e, "dc32270a988d8aa12f7a83202803b4951b441e9fe5054e5c17032c31bf53a766d1acd649a992cba1a2aece91223e"}, &(0x7f0000000200)=0x36) read(r0, &(0x7f0000000380)=""/100, 0xffe4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40402420}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xe8, r5, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8824}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x400}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40000}, 0x4004001) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000580)={0x0, 0x9, 0x100000000}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x40, 0x0) 13:47:34 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x37000000}) 13:47:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000008480abc900000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x14, 0x400000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x3, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xcf, &(0x7f00000009c0)}, 0xfffffffffffffe67) 13:47:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x2, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x4, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x3, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x6, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:34 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0xfdfdffff}) 13:47:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x201, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:35 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x4, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:35 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000180)) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x8, 0x800) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000000c0)={0x0, 0x0, [0x3ede92ec, 0xc00000, 0xffff, 0x9, 0x8, 0xfffffffffffffffc, 0xffffffffffff0000, 0x1e1]}) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x7, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:35 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0xfffffdfd}) 13:47:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000011104b6f00000000000000000000000000000000"], &(0x7f0000f6bffb)='\x00\x00\x00\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x197) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x303000) splice(r1, &(0x7f0000000040), r1, &(0x7f0000000080), 0x5, 0xc) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:35 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x6, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x8, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:35 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x7, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:35 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x1f00000000000000}) 13:47:35 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x1, 0x0) sendto$isdn(r0, &(0x7f00000003c0)={0x645, 0x1, "5521632d1ddafd020ede0ba5dadddccc7b2cf88a7993e99e091326a6edc055cc6c8085502753bc6a18a32ba83e87a4cc9f7b23019d34b2"}, 0x3f, 0x4040840, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x9, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x8, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:36 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:36 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x3700000000000000}) 13:47:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x100) ioctl$KDMKTONE(r1, 0x4b30, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0x50, &(0x7f00000009c0)}, 0x10) 13:47:36 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x80602, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000540)=""/164) r1 = userfaultfd(0x800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x6, &(0x7f0000000000)={0x7fffffffffe, 0x7}) ioctl$KDMKTONE(r0, 0x4b30, 0x9) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x8a, 0x1) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x4d6}, &(0x7f0000000180)=0x8) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000200)={0x0, {0x0, 0x6}}) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={r3, @in={{0x2, 0x4e22, @multicast2}}, 0x40000000, 0xffffffffffff1d33}, 0x88) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000240)=""/167, &(0x7f00000000c0)=0xa7) read(r1, &(0x7f0000000400)=""/100, 0x7b4f) 13:47:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xa, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x9, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:36 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0xfdfdffff00000000}) 13:47:36 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xb, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000dd000000000000950000000000000017050b356c3a9304260d65263f2380f6507e09f7b971e243db919028b13dd72224761c4eb4008cee4aacfa2d262f23353d0461af30a78307917429bc207e0d3d44f799a853c12e8703c332a7cbfaa732a9ee550e46070bdcc92f7c54873a35621dd63b1c43f6de5e0b5cf55fd9be95f117db24503791ce341420776c82d1e2d0ded4d432f1a924419c2da184abbe5148b931d3787d471ad16ffa3953a786e83114ddddf1e26929e5981113cb1af527022973d8d21b00000000000000000000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xa, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xc, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:37 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x37}) 13:47:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000e4005d117e4e91cc42dfc700000047c9afa5fe775eb2000007"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000040)=0x5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:37 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x40, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000100)={0x0, 0x0, 0x1, 0xffff}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40106435, &(0x7f0000000180)={0x401, r2, 0x2, 0x8}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xb, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xd, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:37 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x1f00}) 13:47:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x20) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x248, r2, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf0}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x28e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdef}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x717dc518}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ae}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000004) 13:47:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xe, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xc, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:37 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x480140, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) r2 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000000c0)={r1, r2, 0x1, 0x2e, &(0x7f0000000080)="e951b8d6124edf9262f55be7d4932f2a27515841a287c6d98a5cc754ae51f4ebe899564b3e7be5aa17d36b60ba99", 0x9087, 0xe0, 0x8, 0x4, 0x3, 0x2, 0x8001, 'syz1\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r3, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:37 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x3700}) 13:47:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xf, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:38 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x1010c1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e23, 0x7, @remote, 0xfffffffffffff000}, {0xa, 0x4e23, 0x1, @empty, 0x7}, 0x1, [0x75a, 0xffffffffffffff92, 0x0, 0x75f, 0x7, 0xffffffffffff8000, 0xff, 0xffffffffffff568e]}, 0x5c) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xd, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:38 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:47:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000000)="0d7a55aec7", 0x5}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x80) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r1, &(0x7f0000000c40)=[{{0x0, 0xc000002000000000, &(0x7f00000009c0), 0x1f6, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) r2 = syz_open_dev$usb(0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(0x0, 0x2000000) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') unlink(0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) lstat(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000300)) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x3000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) r3 = shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffc000/0x2000)=nil) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6, 0x101380) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r4, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x1, 0x2, 0x6}) shmat(r3, &(0x7f0000a00000/0x600000)=nil, 0x1000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:38 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x1f000000}) 13:47:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x10, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xe, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x11, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:38 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x37000000}) 13:47:38 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xf, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x12, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x10, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0xfdfdffff}) 13:47:39 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0xd, &(0x7f0000000000)={0x3f}) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f00000000c0)={0x8, 0x9, 0x4, @remote, 'gretap0\x00'}) read(r0, &(0x7f0000000380)=""/100, 0xffe4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x101fd, 0x2, 0x4, 0x1000, &(0x7f00004b4000/0x1000)=nil}) 13:47:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x13, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x8080) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000140)=""/116) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0x30, &(0x7f0000000080)}, 0x3) 13:47:39 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0xfffffdfd}) 13:47:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x14, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x11, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 1: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f0000000000)={@mcast1, 0x0}, &(0x7f0000000040)=0x14) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x1a1002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x3, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], r0}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r3, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:39 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x1f00000000000000}) 13:47:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x12, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x15, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:40 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000180)=""/210) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000000c0)=""/2) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x13, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='GPL\x00', r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:40 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x3700000000000000}) 13:47:40 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xc0, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x14, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:40 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:40 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0xfdfdffff00000000}) 13:47:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x15, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:41 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x60080, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xaa59, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r2, 0x6dd6, 0x77, r3}) 13:47:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:41 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000040)={0x70003, 0x0, [0x1, 0xffffffff, 0x1c40000000000, 0x3f, 0x100000000, 0x0, 0x4]}) 13:47:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0xc0, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:41 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x17c00, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0x1e, &(0x7f0000000040)}, 0x10) 13:47:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x0}, 0x48) 13:47:42 executing program 2: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x7, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000200)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000480)={{0x7, 0x10000, 0x400, 0x100000001, 0x9, 0x7f}, 0x100000001, 0x62, 0x9}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) splice(r1, &(0x7f0000000180), r1, &(0x7f0000000100), 0x1, 0x1) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x200, 0x0) socketpair(0xa, 0x800, 0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="5d0f000002004e24e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e207f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1e0101000000000000000000000000000000000000000000000000000000000000000000000000000000000000009fb66d7c3827d5e9690000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a4c25dfcdb23125cd2e3f467c3e3513e30e2f021dd9a031d15c6377671e8712f090f296e40bc4dba401436877ca41756ced4098a9c5741728c1ecc18ce5b974e60672ba78ed15e7f5d12bbdecec770b28acb9e70d6855d8e4cf9d63a851f3b720a49c5ede4618f2adc001464bad37a143450ec5b59ce23b9c910d2a7fe2bdcf67baef2967a87c9e794eb1281df227a7402a286f3d19896f6fb9a7d0c5ca4ded640b1c76fbd9e12b3b842"], 0x48c) clone(0x100000, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000240)={0xfffffffffffffe00, 0xc6, 0x7, 0x80000000, 0x1, 0x8, 0x9, 0x7e7, 0x5a240fbc, 0x9, 0x0, 0x7f}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x64, r3, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x4008000) read(r1, &(0x7f0000000380)=""/100, 0xffe4) setsockopt$inet_int(r2, 0x0, 0x13, &(0x7f00000004c0)=0x7, 0x4) 13:47:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xa, 0x10200) sendmsg$kcm(r1, &(0x7f0000001780)={0x0, 0xffffff20, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:42 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:42 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) clock_gettime(0x88, &(0x7f0000000400)) r0 = socket$inet6(0xa, 0x3, 0x800000000006) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa, 0x10, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000180), 0xfffffffffffffe4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) lookup_dcookie(0xc, &(0x7f0000000900)=""/127, 0x3c) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x2, 0x3}, 0x20) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x121003, 0x0) mknodat(r1, &(0x7f0000000340)='./file0\x00', 0x1000, 0x6) io_setup(0x4003, &(0x7f0000000640)=0x0) r3 = open(&(0x7f00000005c0)='./file0\x00', 0x80, 0x40) io_cancel(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f0000000000)="17647ab814fe4440948e5e7ce22fb9d823e729fe5a531796869ccee044d238511bdc864b342c2b5d23c83d19", 0x2c, 0x80000000, 0x0, 0x1, r3}, 0x0) clock_nanosleep(0x7, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@mcast2, 0x8, 0x1, 0x3, 0x2, 0x80000000, 0x7f, 0x6}, 0x20) r4 = dup2(r1, r1) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000000680)=0x20) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x8400, 0x0) getsockopt$sock_int(r4, 0x1, 0x2b, &(0x7f00000008c0), &(0x7f0000000440)=0x181) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x200, 0x3, 0x2, 0x80000000001, 0xeed3, 0x2a57, 0xfffffffffffffffb}, 0x10a35672234e7a91) close(r0) r5 = gettid() gettid() ioctl$TCSBRKP(r1, 0x5425, 0x2) r6 = syz_open_procfs(r5, &(0x7f00000006c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xac1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xffG\xeb\'\xa19\xf1\x93\"\x80\x7fG3\xc1E\xe6e6\xc6\xc2u\x01% \xe7+0\x97\x84;N\xda\xc4\x80\xc3\xb18N\xbf_\x19_ \xd4_Y%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000380)) sendfile(r6, r6, &(0x7f00000000c0)=0x202, 0xdd) fcntl$setsig(r6, 0xa, 0x30) 13:47:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x40000) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000080)=@in={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="06b144cd27e4e927aa9d351ae0138a6df6a8b2a222dc4853018e1231409ffb7ab8f9a63365087d8be355f3fca8806e43156ed15d766b00cecff36d3dc70cd7a16e5967939a7349e69fcb26cc5561b5d0330da0da0e5c4c7a69e099c7e995f829d4fd16059faa67838f6ae441ee4c91e19fb238abe9326857a764efab058b829f170aa3721923e13d605897d716671b4356e422b2d058845870ef01139c622bc474dde3bb06df9b80fefac85266080e022dab9fda7c5b955fa1121869bd798848071f57548145aa8e168cdcea1972e6f570d4a9590472b4a30c34779fbeee1403e1b99d29ee5527d57976f1106fe97357", 0xf0}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f00000001c0)="d0bb0c56c4d74ede6ddac98afe29971dc6bd7951bdeeb7ccef9c2075d61ab8efe57f117e8d679adb70720830366a5a30de3fc81a59a45f1c25d0d823d153f06869562c94bc50078a1a554ff306a697a6e4b65c8f1e581b629ecc3a00a859bd5217e8abd5bd48e2a0449d23d8d3758762aa2a70a086ae9eaa2ce912e371bdb51985f8f9cf9f6eb527292bf4baa7b9b1642144ca6bcd38d13831df02f6e5058df662ad81799c55f185efb222a512b1e562dcb9ea9e8b3a6d79", 0xb8}, {&(0x7f00000003c0)="f51eacbc422a56997b9cb1dc808960c99bd4731e973c75d4d0afa71acef2cd92a8987ed38f9d33a6f12b7ee7643acc91bbfa58089359d143d199ed030db1e652a9b7a05e9a6b05b8c31fc7b04df23708705f3bfb7b301f5ad960ea27d722bd3e57a3dfef6651a20acfe33a6dbad5be094fc4c05a6e84869ae3cb7e19639bad75709a5f480f7eae95a025be1cc992105a3662c0c85862aad61c8e9b", 0x9b}], 0x4, &(0x7f0000000480)=[@authinfo={0x10, 0x84, 0x6, {0x3fc}}, @init={0x14, 0x84, 0x0, {0xffffffffffffffff, 0x1, 0x0, 0x400}}, @dstaddrv4={0x10, 0x84, 0x7, @loopback}], 0x34, 0x804}, 0x20000000) 13:47:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:42 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:42 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 13:47:43 executing program 2: r0 = userfaultfd(0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) recvmsg(r1, &(0x7f0000000740)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000180)=""/216, 0xd8}, {&(0x7f0000000000)=""/29, 0x1d}, {&(0x7f0000000280)=""/46, 0x2e}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f0000000400)=""/254, 0xfe}, {&(0x7f0000000500)=""/195, 0xc3}, {&(0x7f0000000300)=""/123, 0x7b}], 0x7, &(0x7f0000000640)=""/216, 0xd8}, 0x2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000040)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1ff, 0x100000000, 0x0, 0x12, 0x17, 0x0, "52e1725a442a80a8a7d1c0a1acd84ea33d64e3f820fc9e6c64ad60503ff2e8bc787bbc18bd652d569093539d8688961853d76fdf49a12e388f3dcd8d8acd0fb4", "f1b5578542a219028261d8bca0f9dabd5a980ae8a7639a99569b8d885e6532c0fe1a1c286437588d5a23db6f866055fdfc7e35329ad4699d1df2b38531654d6d", "07a70afda01eb9e63015ee95a7e986d251f4ab01e5c4f8144798603ba1a94e94", [0x5, 0x4]}) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x9, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:43 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r1, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:43 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x9}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0x3ff}) 13:47:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:43 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:43 executing program 0: syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) creat(0x0, 0x8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) clock_gettime(0x0, &(0x7f0000001400)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x100000000000006b, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r5, 0x8400ae8e, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x9, 0x4000) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, 0x0) 13:47:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10f) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:43 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:44 executing program 2: r0 = userfaultfd(0x800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:44 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800deffffff0010a4e2851d5ebeea9b95000000f800000070ed5ad745eb6f5ab2567e8208d1ccaa2885730185bedc100452fa8c2fe96ee50be4c79f99ffe09b8749480f747a464e6a22eed269167cccf3f3401e6b845d5f1a77d0df866366820dfcc61f91a04866a7f105f3c8a2aa92a1b524"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x41, 0x5, 0x7, "f65a970dbaadc3736cb02b31e72dcea8", "1c32fc5cb40fe2cf198b15929777e2b6cc4c3ed7513730e3226de54c0a1f5221af9ddbe357e80be4214fd961"}, 0x41, 0x3) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x140, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000040)) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000100)=0x1) 13:47:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000000000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000340)=""/175) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x8040, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000600)={0x0, 0x2, 'client0\x00', 0x0, "f53f0094036c6c00", "63f91a3c787b91ec03f9fd428f0172e2c149b83499973de883ddba09a57dcc0e", 0x3, 0x33093e40}) r2 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x3, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f00000004c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'bctf0\x00\x00\x00\x00\x00\x00\"\x00'}) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)) rt_sigtimedwait(&(0x7f0000000400), &(0x7f0000000500), 0x0, 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x600200, 0x0) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x0) finit_module(r1, &(0x7f0000000740)='nodevkeyringsecurity\x00', 0x1) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000280)={0x0, 0x80000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:47:44 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0}) 13:47:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x50}, 0x10) 13:47:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x9, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:44 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x37]}) 13:47:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x888, 0x10000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0xb10, 0x70bd29, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8714375c332e6a16}, 0x4008000) 13:47:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:45 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xfffffffffffffef5) 13:47:45 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x1f00]}) 13:47:45 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = getpgrp(0xffffffffffffffff) fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r1}) 13:47:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x3, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) 13:47:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x12, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:45 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x3700]}) 13:47:45 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r3, &(0x7f0000000080), 0x1c) syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) linkat(r1, 0x0, r0, &(0x7f0000000180)='./file0\x00', 0x1000) 13:47:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:45 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) getpriority(0x2, r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r1, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:46 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@int=0x297e6f9b, 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000400)) clone(0x0, 0x0, 0x0, 0x0, 0x0) msync(&(0x7f00004b5000/0x2000)=nil, 0x2000, 0x6) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:46 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x1f000000]}) 13:47:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x147) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 13:47:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x12, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:46 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000600)='/dev/vcs#\x00', 0x100000001, 0x80400) r0 = getpid() capset(&(0x7f0000000800)={0x0, r0}, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000400)=0x19, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000001c0)={'ix6_\x81ti0\x00', 0x403}) 13:47:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x21, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x8, 0xfff, 0xa84}, {0x2, 0x40, 0x3, 0x3000000000000000}, {0x9, 0xd80, 0xffffffff, 0x9}, {0x2, 0x9, 0xddba, 0x5b97010e}, {0x100, 0xffffffffffffffff, 0x800, 0x9}, {0x6, 0xfffffffffffffff9, 0x3fffc, 0x1}, {0x40, 0x0, 0x5, 0x4}, {0x3, 0x4, 0x5a3, 0x40}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) [ 288.429618] sctp: [Deprecated]: syz-executor.2 (pid 15564) Use of int in max_burst socket option deprecated. [ 288.429618] Use struct sctp_assoc_value instead 13:47:46 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x37000000]}) 13:47:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13d, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 289.220554] sctp: [Deprecated]: syz-executor.2 (pid 15569) Use of int in max_burst socket option deprecated. [ 289.220554] Use struct sctp_assoc_value instead 13:47:47 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) fadvise64(r0, 0x0, 0xfffffffffffffc01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f00000000c0)=0xce) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x2000}, {}], 0x2, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) syz_open_pts(0xffffffffffffffff, 0x8100) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r0 = socket$inet6(0xa, 0x800, 0xffffffff) ioctl(r0, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000017c, 0x0) 13:47:47 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0xfdfdffff]}) 13:47:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000001a7c565b9268ba00000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = dup(r0) ioctl$KDDELIO(r1, 0x4b35, 0x100000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x21, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x18d1c7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xffffff1f, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095002913b2774ad674e1c1c122000000000000e338c44c5a828607e87f7869d2b8cd85c932b10b1da01c79967a30f2c0a54ef9f2d5cf187be50f8dc54369b2a3f6082195a29f69bf343a3b55c53a2020c8e3dab4e1003d4c1a568795511d3b20fdca8ec381fbfb9a9ddeb1b28a9748872c0f5eb26ba580d1ed9963a20a2612510689d4337638bd08dd5532d9fb3bbc27fb85e8a9ee412dc223c65477615ecb3e66660fc784aa2f587a1d6c7f49b52e0b0cf1a4"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:47 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0xfffffdfd]}) 13:47:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x132, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x2, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000000)="0d7a55aec7", 0x5}], 0x1}, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0xffffffffffffff81, 0x9, 0x1, 0x5, 0x94, 0x3f, 0x6, 0x8}, &(0x7f00000000c0)={0x3, 0x5, 0x2, 0x8, 0x6, 0x9fb2000, 0x0, 0xff}, &(0x7f0000000100)={0x294, 0x1ff, 0xffff, 0x4, 0x7, 0x80, 0xc2, 0x1}, &(0x7f0000000180)={r1, r2+10000000}, &(0x7f0000000200)={&(0x7f00000001c0)={0x2}, 0x8}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0x50, &(0x7f00000009c0)}, 0x10) 13:47:48 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f00000000c0)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_G_FMT(r1, 0xc0cc5604, &(0x7f0000000180)={0x8, @pix_mp={0x7fff, 0x2e, 0x3377575f, 0xb0c6e7e93fdc192, 0xb, [{0x1, 0x67}, {0x5, 0x1c9}, {0x9, 0x80000000}, {0x9, 0xe8e}, {0x7}, {0x3, 0x2}, {0xffffffff, 0x5}, {0x1ff, 0x175}], 0x63c8, 0x0, 0xb, 0x2, 0x7}}) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x141, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:48 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x1f00000000000000]}) 13:47:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000001"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x40000, 0x0) write(r1, &(0x7f00000000c0)="e3c48626aae067f2c470207805c942583ec82962b021b696b660d98671f85099b2554c396fe49e7cf1b31779cc66c5026a9211b8130ff45bad4e1826b80b67424c589cfc6eb52a58b4c83c203d2178c3ceabfb5991861086b1b82db6c29799012e7808493f1278d3961b04ab8d7a58e56889d57ae0d4f7ac6f4cd2f15921ada5127ac8d2e998e0ad39f58e732ad417cbd911a841fd982358232ed028efa643a20dca82b00cffa3987eeba0f98d07a997f1a894d7f66024c22d0309bcf053fd60248879d986672173fe6d2cf25d4a639002652fd72693d7", 0xd7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f0000000040)={0x1, {}, 0x7, 0x7fff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r2 = dup(r1) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000080)={0xffffffffffffffff, 0x2, 0x7fff, 0x1, 0x7}) timer_create(0x6, &(0x7f0000000000)={0x0, 0x5, 0x4, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_settime(r3, 0x1, &(0x7f0000000200)={{0x0, 0x1c9c380}}, &(0x7f0000000280)) 13:47:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00\xb0\x90Z.\xa4I\xdarKN\xf3\xd1\x81Z\x01E\xd4\vu\xf5|.|\xddM`\xcfS\x14\a\x18\x8fC\x84,\xad\x96\f_\xcd\xe0-k\xaa\x02\x8f\x9b\x1d\xad)\xe7\x1eH)\xb5\xf8\xa7\xaf\xe9\x11\xdd\xe9\b\x1b8n\xaf\xd4\xa2j5\x04K\x01\'6^k\xe8\"td\xa4\x14\xf4\x01\xf6\xfc\x93\x9aX\x9c\xf6\xfc\xfcB\x93\x16\x93\x16l\x8eE\x12*\xddM\xd78\xea\x9e\xcaE\"$r*\x01\xcc\x981', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 13:47:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x300, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x9, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:48 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x3700000000000000]}) 13:47:48 executing program 0: socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='limits\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 13:47:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000f8ff0000000000000000950000004d000000"], &(0x7f0000f6bffb)='GPL\x00', 0x6, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0xfffffffffffffffd}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x3}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x9, 0x480000) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000040)) 13:47:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x18d1c7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:49 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x2, &(0x7f00000001c0)={0xfffffffffffffffc}) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x151881, 0x0) bind$tipc(r1, 0x0, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x2, 0x5) r2 = socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xffffffea) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_security(0x11, r5, &(0x7f0000000780)=""/91, 0x5b) connect$packet(r4, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) geteuid() pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r6+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000180), &(0x7f0000000340)=0x4) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r7, @in6={{0xa, 0x4e22, 0x0, @mcast2, 0xffffffffffff0000}}, [0x8, 0xd7c, 0x1ed8, 0x3, 0xfffffffffffffffc, 0x4, 0x3, 0x4, 0x200, 0x0, 0x7, 0x1, 0x9, 0x0, 0x6]}, &(0x7f0000000100)=0x100) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xa, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:49 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0xfdfdffff00000000]}) 13:47:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000efffffffffffffff9500000000000400"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="0d7a55aec76826275259c4a3f56e595697bb3f5ccf77698c73dba41a25c0a6de2f46ba22955af35f57beedff8492dd9fd45eae2943848513d5ab98aece062be68ba7c61d09c5bdae4147f47abd805083f34443d3fb271eb76f9f6f19ab89f2fc85bca09abcc1f4040447c4248a3ae7b83ad6b7a2ed235e88be30bc43ae30eab2a76a9fbe9ff730b159ef8faa6a493c", 0x3e5}], 0x1}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x20000000000000, 0x80000) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x8001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xffffff1f, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, 0x0) 13:47:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x2, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000017c, 0x0) 13:47:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:49 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x37]}) 13:47:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:49 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x24000, 0x0) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000000c0)={0x0, 0x9, 0x1016, 0x1}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="cd3c0d6765ab74ff873d78a333bb23c2b087a4d0f13f1df6c84fb5373a1fbf7d7c87ccef132d0a42d7b5d5edd33d2f1ccf515862ba8a619949712a42e779ec69676538fad4817d826adeb635762a0efa03541dcc12b4f952a608c71cd92bcc824471bae6904a355f7991c74cb05c6ddf962cd833fcfeb1e418613bebd64286a6c4623082d0f163f60ac74e022306b7c29fb436fd578a4b96", 0x98}], 0x1) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x20001, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:49 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x1f00]}) 13:47:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x9, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x4280, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) io_setup(0xff, &(0x7f0000000100)=0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400000, 0x0) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x9bd7, r1, &(0x7f0000000140)="dc2adb9bf16065f5987b7196c753b0f22945e074b1d2f3d729b009c3d0f6bb8154ca4d", 0x23, 0x4000000000000000, 0x0, 0x1, r3}, &(0x7f0000000200)) 13:47:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) 13:47:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0fbc"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:47:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:50 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x3700]}) 13:47:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xa, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000009500000000000000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) write$P9_RLINK(r1, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x50, &(0x7f0000000080)}, 0x10) 13:47:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:50 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x1f000000]}) 13:47:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:50 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x5, &(0x7f0000000000)={0x6, 0x4000000000000}) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x20001, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/xfrm_stat\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x4000) 13:47:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500aab201d764000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xf, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, @jmp={0x5, 0x6eb, 0x7, 0xb, 0xf, 0x100, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x33}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x20}, @generic={0x7, 0x7, 0x80, 0x1, 0x40}, @jmp={0x5, 0x101, 0x8, 0x5, 0xb, 0x6, 0xffffffffffffffff}, @exit, @exit, @ldst={0x2, 0x1, 0x3, 0x9, 0xa, 0xffffffffffffffff, 0x1c}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000000c0)=""/191, 0x41f00, 0x1, [], r1, 0x4}, 0x48) 13:47:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:51 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x37000000]}) 13:47:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 13:47:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:51 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0xea032f4e8174e1df, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@loopback, 0x0}, &(0x7f0000000080)=0x14) ioctl$TCXONC(r0, 0x540a, 0x7) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000180)='/dev/udmabuf\x00', 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="18020000008b829bd3e8313a6800e3d0522840880000950000000000002703"], &(0x7f0000000000)='GPL\x00', 0x1, 0xee, &(0x7f00000002c0)=""/251, 0x41000, 0x2, [], r1}, 0x48) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000200)=0x109e06b2) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000240)={0x3, 0x2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000440)="c5b235ef94a65bdb32d93076cac7ce4a61a762f383c9dc619569ebbb8397bdbda8cb0d7ec8faff4ca3da7caa4804a634bc24b1d90311fb76b49199b932883f9d6663094cb1469535a7bd3045832a3d1c2a1d4b09878fff2d7edf0569d43958c55db13aa3", 0x64}, {&(0x7f00000004c0)="9479112ccea9c5ca62e9cd900149bc6aba452e2dfb90a6fdeede4a3494da17e797fba096c06456cafc6d403ac5d560b9a1fd57aa28a95c8bf33aa6e09010376fb907b6dd65acb8354504661368b363c3d4f6c399db2bb93161af03f7f68ce4dd6887f7395e2fb78b75100feb1636b279a7177c65d02f2a254eb6b602b09ca62884", 0x81}, {&(0x7f0000000640)="6e7e0e511fb828991cf65e785730fc9b6f9462d556ca6f63753d6b5652010a97731273d92fa9d0c43fd78723c6db96314cfe7a49ee3acc2e05e0b5ebd18735d33733e6848d1a3e8a3cf6d7cfe9a67e07c216d7e41b1b", 0x56}], 0x3}, 0x0) getsockname$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, &(0x7f0000000400)=0x1c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r2, 0x2e2, &(0x7f00000009c0)}, 0x10) modify_ldt$write2(0x11, &(0x7f00000001c0)={0x2d, 0xffffffffffffffff, 0xffffffffffffffff, 0x924, 0xc7, 0x10000, 0x7f, 0xaab, 0x100000001, 0x5}, 0x10) 13:47:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xc, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:51 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0xfdfdffff]}) 13:47:51 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9b8, 0x10000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0x3, 0x1, 0x3, 0x3, 0x98e}}) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:51 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) sendmmsg$alg(r0, &(0x7f0000000b80)=[{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="53d7ba16c4991e2a091a4d3abe25c0e1ed6e48f3822f65cc280c72f57e35440335f3ab657c3c122ed7bec06b135ac510a03aaa0c0a8d430a197727a9fe10d220283de189fb3a2f8899be5bd18fa10306c4bfca1d53066ad01fd60384b285178e533da74a922ac55ba3ff5d37730e1939ff1720d39fb7e0adc8bccb14c9d89563", 0x80}, {&(0x7f0000000100)="4cf86834ae600662166ac8abe3fbabada405b4f00b8875b8f8547197c0363032c5114ee28f1edb3a421698c412dc32422e90311f787970bfd62bac83888fd9167e6a989d6c2f6e2f732ca5ebd086636e3b4bb014f92d4de04fcb90d853b5eafa5278d007186a2fd535ffcb0bbe0d79e4bbe109", 0x73}, {&(0x7f0000000180)="c06a176af99a65cfe5489a37c950b588f86d967cc84a7d461e3aa3e4559b68e774d49269eb215187ea5d273db7c43fe410a46d9614f5a85a00ef18a6b702e88f9160bec2be826f6d2b2ee5b2ea1e534188312f60dc757fd95d83e6f00fa2e2eb5c935294297d2fbff62079214bfcf7b5fd3f8b7bece34646dfb3b85a7e40fb0e1da674b3d8df49642465d689a2687d54f041e7da1f471371f7a72b7592852b0cd95d931306374046d101771368292e77dfc8ba03ece4aa330f60db95d68eba1642a2", 0xc2}, {&(0x7f00000003c0)="e4c38d25217cfbbf37002e6441460bfee3b66e146631bcf5d49344ff58d5f1336801a86b7f8aa86a62267f2e946c7a16b72320b6491345724887777b6c3c8347e06fb6da62b3e7", 0x47}], 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="10000000170100000500000002000000c80000001701000002000000b6000000bea585d3b9dbffbf98584b96d7054b07b7c54439deda72edd282aecbb18919ccae73ff24e2a4db5edf72523f33d1f73170ecc5ada135eac225271c54ee535310f1aab0bd921958952c5ef4cdab345cc9579474487f0f39acfc38965178550a6a9d08e9a3a98618250427f2bdc0c0ef193af1442ff46cad17bace88b9ce79e97f840e316f64cdac81f57c9a40f7ac4070515381a366a41a1ee968abed35160cfcff11ef557d7e3949057a637b3f1b7b38e7db5af3055b0000"], 0xd8, 0x40080}, {0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000540)="f8c134db6dffbcf9790a1fa1618a3fe2615f99f1a3359aa616c29e9d1763ad550f843e9975eb9c3826e8de12d6ed54537b5b6228026763b2bd82d4485abda2f809f3e4064e329533daadd861f88090d524ef6b56482f2ec7cc773bc2d5d26b260090eaf3d4a03bb2d2795b8adccfb6a9c578f5eabd468eb4a7520a3f9004ab55a7a7b6334cad838f3f874d89b923f63a44e886e2cfe08d99f57196f6b1a3e89237589d1b772120d1cbff3d99a6", 0xad}, {&(0x7f0000000600)="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", 0xfb}, {&(0x7f0000000700)="682dcb16330f0849a3ce9c7c8957655405551f12cc36cca56e88e7c85ac9e7d936dfd7ab20d1b97964c56f7b9ecb62da015b6f86fdb3174d4cfef3572e793783ae421cb981ecb5833e11cf3395211de3d4dbc33496b99f79153901c69f573c9cb35cca88211e5d1110", 0x69}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f0000000780)="f2edb71bab9b9f25bfb3955b485c6d321fd06e6397e8f8046822cc9913d86efc2651609f429b6ac2f7b3ec92dc5fb463a40ac6756ee96380cedd9ffe8e37cb1dfab9ce4a75353591b3e274043973f6e38a9bcab274b208170395a94ca01e202ac2f8eac0d5c9be26ddefcbcef5925341444bb289fb85bd3964d4eaf2d0cbe01c3506d7cf6154a609ca17e6ec32514a6d3eecdeb93302bf6777887f8a6cfc2391f2875fd96d8682295455219b701452775e2a9723442d78e66c3037257e8b30b8553bcb6ea84b5c03c2002dc9f7519957aa47ffddef6e3b36fd3ff87a1548098a9c296d615215b197680353d219caf6732adf7bf0e5b698", 0xf7}], 0x5, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000000017010500030000000000000058000000170100000200000046000000ed75f3524e9c0973507fa34db0bb408e8e21afd2e6912477d28903113e88000fbc301a8e84f2f5cc46ccf4f371b947f10f396bbef241f7dbc4cf79fce00600000017010000020000005e000000a5d5bd3c5ab4ee5306f014e545b3e1576b3071aa30377ff0b82e4717d739fe2d9ec38f3d16d6b08d12b2a427843091ad33a922afc660e32a10154c95686d521716bf58ea4e25c7976803b3d6e0b1f50d2c408187fede315608011535931e0000"], 0xd8, 0x4080}, {0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000a80)="fd19f5fcc8dffb9ff8fcfea410ee31789e9d18abf399dc4b29fc78b02d8580d3ca98738a29cfae4e6e75285409923494ac7d", 0x32}, {&(0x7f0000000ac0)="abc3d05b31801dd3186d3413fab6505ad81b2863c22b86760fed06faea06d2d70f9b20fde6e21ea3e491ec6d12097d35938625dc7dcf8244f7b69d93e737b8989906fb825b90fb884d4012f956292a10528cc26733ada22d0c71c0a51b176d2e059984", 0x63}], 0x2, 0x0, 0x0, 0x4044000}], 0x3, 0x48000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180020000000000000000c00000008009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r1, 0x2e2, &(0x7f00000009c0)}, 0x10) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000c80)={0x1, 0x5}) fsetxattr$security_capability(r1, &(0x7f0000000c00)='security.capability\x00', &(0x7f0000000c40)=@v1={0x1000000, [{0x401}]}, 0xc, 0x1) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7ff, 0x101000) 13:47:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xf, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:51 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0xfffffdfd]}) 13:47:51 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10219) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001600)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d00)={{{@in=@dev, @in6=@empty}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 13:47:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x14, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:51 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x1f00000000000000]}) 13:47:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xc, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000346fc8)=@raw=[@call={0x85, 0x0, 0x0, 0x57}], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x15, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) [ 295.271635] device bridge_slave_1 left promiscuous mode [ 295.277384] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.343125] device bridge_slave_0 left promiscuous mode [ 295.348739] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.501915] device hsr_slave_1 left promiscuous mode [ 295.553924] device hsr_slave_0 left promiscuous mode [ 295.602708] team0 (unregistering): Port device team_slave_1 removed [ 295.617640] team0 (unregistering): Port device team_slave_0 removed [ 295.629431] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 295.675228] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 295.763972] bond0 (unregistering): Released all slaves [ 296.358479] IPVS: ftp: loaded support on port[0] = 21 [ 296.483398] chnl_net:caif_netlink_parms(): no params data found [ 296.534795] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.541971] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.549635] device bridge_slave_0 entered promiscuous mode [ 296.556985] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.563898] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.571507] device bridge_slave_1 entered promiscuous mode [ 296.593604] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.603525] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 296.625229] team0: Port device team_slave_0 added [ 296.632456] team0: Port device team_slave_1 added [ 296.691406] device hsr_slave_0 entered promiscuous mode [ 296.758858] device hsr_slave_1 entered promiscuous mode [ 296.845464] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.851897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.858588] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.864946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.881264] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.898544] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.964323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.982418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.995916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.006515] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.016785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.025109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.033810] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.040214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.051717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.059804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.067317] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.073711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.090161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.098034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.106446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 297.114713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.122563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.132282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.140189] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 297.161425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.173300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.184108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.195882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.208703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 297.229003] 8021q: adding VLAN 0 to HW filter on device batadv0 13:47:55 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100)=0x8000, 0x4) r2 = accept4$inet(r1, 0x0, &(0x7f0000000040), 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) readahead(r1, 0x0, 0x8) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e22, @broadcast}, 0x10) read(r2, &(0x7f0000000380)=""/100, 0x64) 13:47:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xf, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:55 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x3700000000000000]}) 13:47:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000001000)=ANY=[@ANYRES64], 0xffffff8a) 13:47:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x17, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x8, 0x2000) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f00000000c0)={0x3, 0x0, [{}, {}, {}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) 13:47:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x14, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:56 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0xfdfdffff00000000]}) 13:47:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) dup(r0) 13:47:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x15, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x1c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:56 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000040)) clone(0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:56 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x37]}) 13:47:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000500000000000000000008"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0x2e2, &(0x7f00000009c0)}, 0x10) 13:47:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x1d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x17, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:56 executing program 0: r0 = socket$inet(0x10, 0x3, 0x9) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000170a07031dfffd946fa209000000000000000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 13:47:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge_slave_0\x00', &(0x7f0000000000)=@ethtool_channels={0x25}}) 13:47:57 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x1f00]}) 13:47:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000003000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000a40)="0d7a55aec7", 0x5}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x5f6}, 0x10) 13:47:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x24, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) pipe(&(0x7f0000000280)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:47:57 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1a0, r2, 0xa00, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xec, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x712}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000000000000}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x439}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x78c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4d}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000010) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x25, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000005c0), &(0x7f0000000600)=0x4) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x100000020000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x2020141046, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000003c0)={'ip6_vti0\x00', {0x2, 0x4e22, @multicast1}}) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=""/136, 0x88) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000340)) creat(0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ftruncate(r3, 0x280080) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendfile(r1, r3, &(0x7f0000000000), 0x200800900000002) 13:47:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x1c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:57 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x3700]}) 13:47:57 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='smaps\x00\xc5H5\xc5#\x8eSy\x02\xfa\xbe\xe8\x8f\xeb\xfbS\x82\x91\x13\xb6\xa1y]I\x96>PE\xbcf\xdfAI\xea7\xb0\xaa\x82g\xe2\x8dtD<\xac\xfa\xbd)J\xe5\xb4\x90\xe1\v\xbb\xa7\x185:\xaf-q\xa4\xb6\xbf\xc5F\x8e\xb9R\x96\x8e$') sendfile(r0, r1, 0x0, 0x80000001) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 13:47:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x1d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x27, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:58 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x1f000000]}) 13:47:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x24, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x2c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:58 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000000003, 0x600031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000024c0)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 13:47:58 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x25, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:58 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x37000000]}) 13:47:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$xdp(0x2c, 0x3, 0x0) close(r1) 13:47:58 executing program 1: pipe2$9p(&(0x7f00000001c0), 0x0) 13:47:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x2d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\a']}) 13:47:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x27, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {}], 0x3, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000017c, 0x0) 13:47:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:59 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0xfdfdffff]}) 13:47:59 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0xfffffdfd]}) [ 301.458527] protocol 88fb is buggy, dev hsr_slave_0 [ 301.463748] protocol 88fb is buggy, dev hsr_slave_1 [ 301.768486] protocol 88fb is buggy, dev hsr_slave_0 [ 301.773627] protocol 88fb is buggy, dev hsr_slave_1 13:47:59 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0xd, &(0x7f0000000040)={0xfbffffdffffffffa}) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:47:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x8}) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001000)=ANY=[@ANYRES64], 0xffffff8a) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) 13:47:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x2c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x34, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:47:59 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x1f00000000000000]}) 13:47:59 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x3700000000000000]}) 13:47:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x35, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x2d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:00 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r0) 13:48:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x37, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:00 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0xfdfdffff00000000]}) 13:48:00 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x8000000) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:48:00 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x37]}) 13:48:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x14}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 13:48:00 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x34, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x3c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x35, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x3d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:01 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1f00]}) [ 303.151518] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:48:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x14}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 13:48:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x37, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:01 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x20}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b8000/0x1000)=nil, 0x1000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) [ 303.342203] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:48:01 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x8000000) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:48:01 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3700]}) 13:48:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x44, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x3c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:01 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='smaps\x00\xc5H5\xc5#\x8eSy\x02\xfa\xbe\xe8\x8f\xeb\xfbS\x82\x91\x13\xb6\xa1y]I\x96>PE\xbcf\xdfAI\xea7\xb0\xaa\x82g\xe2\x8dtD<\xac\xfa\xbd)J\xe5\xb4\x90\xe1\v\xbb\xa7\x185:\xaf-q\xa4\xb6\xbf\xc5F\x8e\xb9R\x96\x8e$') sendfile(r0, r1, 0x0, 0x80000001) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 13:48:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x45, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:01 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1f000000]}) 13:48:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x3d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:01 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:48:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x47, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x44, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:02 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x37000000]}) 13:48:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x18) 13:48:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x4c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:02 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) rseq(&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x1, 0x65de}, 0x1}, 0x20, 0x1, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x45, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:02 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfdfdffff]}) 13:48:02 executing program 0: socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)=0x10000003e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='limits\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 13:48:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x47, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x4d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:02 executing program 1: 13:48:02 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfffffdfd]}) 13:48:02 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1f00000000000000]}) 13:48:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x4c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x4f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:03 executing program 1: 13:48:03 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x8, 0x2000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80040085}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x84, r2, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="fcfca6c7dfaf687472e6b3004854be16"}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x84}, 0x1, 0x0, 0x0, 0x4040800}, 0x41) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7533, 0x200002) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0185649, &(0x7f0000000100)={0xfffffff, 0x3, 0x1ff, [], &(0x7f00000000c0)={0xb909dd, 0x401, [], @ptr=0x1}}) fcntl$addseals(r0, 0x409, 0x4) shutdown(r3, 0x1) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:03 executing program 0: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300002, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0x3e}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 13:48:03 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3700000000000000]}) 13:48:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x4d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x54, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:03 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x33) 13:48:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x55, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:03 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 13:48:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x4f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:03 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) syz_open_dev$mice(&(0x7f0000001640)='/dev/input/mice\x00', 0x0, 0x0) 13:48:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x8, 0x200209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x2c) 13:48:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x57, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:04 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0xfffffffffffffffe, 0x4, {0x2}}, 0x18) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x210000, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x200, 0x0) mmap$perf(&(0x7f00004b5000/0x1000)=nil, 0x1000, 0x1, 0x1010, r2, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:04 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x37]}) 13:48:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x54, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:04 executing program 0: 13:48:04 executing program 1: 13:48:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:04 executing program 1: 13:48:04 executing program 0: 13:48:04 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1f00]}) 13:48:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x55, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:05 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x2, 0x4}, &(0x7f00000001c0)=0x8) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x57, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:05 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3700]}) 13:48:05 executing program 1: 13:48:05 executing program 0: 13:48:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x61, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:05 executing program 0: 13:48:05 executing program 1: 13:48:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x62, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:05 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 13:48:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:05 executing program 1: 13:48:06 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x8}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f00000000c0)=""/100, 0x400) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc008641d, &(0x7f00000011c0)={r2, &(0x7f00000001c0)=""/4096}) 13:48:06 executing program 0: 13:48:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x63, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:06 executing program 1: 13:48:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:06 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x37000000]}) 13:48:06 executing program 1: 13:48:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x64, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:06 executing program 0: 13:48:06 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 13:48:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:06 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 309.223069] device bridge_slave_1 left promiscuous mode [ 309.229611] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.279592] device bridge_slave_0 left promiscuous mode [ 309.285163] bridge0: port 1(bridge_slave_0) entered disabled state 13:48:07 executing program 0: 13:48:07 executing program 1: 13:48:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x61, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:07 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x800000, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x65, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:07 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 13:48:07 executing program 0: 13:48:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x62, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:07 executing program 1: 13:48:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x67, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:07 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3700000000000000]}) 13:48:07 executing program 1: 13:48:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x63, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:07 executing program 0: 13:48:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x64, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:08 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) pread64(r0, &(0x7f0000002400)=""/4096, 0x1000, 0x2000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x69, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:08 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 13:48:08 executing program 0: 13:48:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x65, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:08 executing program 1: 13:48:08 executing program 1: 13:48:08 executing program 0: 13:48:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x67, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6a, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:08 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x37]}) 13:48:08 executing program 0: 13:48:09 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0x7, 0x3}, 0x14) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b8000/0x11000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:09 executing program 1: 13:48:09 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 13:48:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x69, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6b, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:09 executing program 0: 13:48:09 executing program 1: 13:48:09 executing program 0: 13:48:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6a, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:09 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3700]}) 13:48:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:09 executing program 1: 13:48:10 executing program 1: 13:48:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:10 executing program 0: 13:48:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6b, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:10 executing program 2: r0 = userfaultfd(0x800) open(&(0x7f00000000c0)='./file0\x00', 0x60000, 0xa) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x40000) 13:48:10 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 13:48:10 executing program 0: 13:48:10 executing program 1: 13:48:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:10 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x37000000]}) 13:48:10 executing program 0: 13:48:10 executing program 1: 13:48:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x71, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:10 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 13:48:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:11 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4000, 0x0) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x3, {0x7, 0x1c, 0x5, 0x0, 0x1, 0x7, 0x4, 0x4}}, 0x50) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x300000, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000180)={0x2, 0x0, 0x9, 0x1, 0x3}) read(0xffffffffffffffff, &(0x7f0000000380)=""/100, 0xffe4) 13:48:11 executing program 1: 13:48:11 executing program 0: 13:48:11 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 13:48:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x6f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x72, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:11 executing program 1: 13:48:11 executing program 0: 13:48:11 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 13:48:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x71, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x73, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:11 executing program 1: 13:48:11 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x20, 0x100) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000000c0)) 13:48:11 executing program 0: 13:48:12 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3700000000000000]}) 13:48:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x72, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x74, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:12 executing program 0: 13:48:12 executing program 1: 13:48:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x73, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:12 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 13:48:12 executing program 0: 13:48:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x75, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:12 executing program 1: 13:48:12 executing program 2: r0 = userfaultfd(0x0) r1 = dup2(r0, r0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x74, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:12 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37]}) 13:48:12 executing program 1: 13:48:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x77, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:12 executing program 0: 13:48:13 executing program 1: 13:48:13 executing program 0: 13:48:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x79, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 315.204174] device hsr_slave_1 left promiscuous mode 13:48:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x75, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:13 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) [ 315.288337] device hsr_slave_0 left promiscuous mode 13:48:13 executing program 1: [ 315.344970] team0 (unregistering): Port device team_slave_1 removed [ 315.380787] team0 (unregistering): Port device team_slave_0 removed [ 315.437817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 315.502639] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 315.672944] bond0 (unregistering): Released all slaves 13:48:13 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x200000002}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f00004b5000/0x3000)=nil, 0x3000}, 0x3}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0xe, &(0x7f00000001c0)={0x0, 0x5}) clone(0x48000000, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) pipe2(&(0x7f0000000000), 0x84800) read(r0, &(0x7f0000000380)=""/100, 0xffe4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000100)) ioctl$BLKRRPART(r1, 0x125f, 0x0) 13:48:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7a, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:13 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3700]}) 13:48:13 executing program 1: 13:48:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x77, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:13 executing program 0: 13:48:14 executing program 0: 13:48:14 executing program 1: 13:48:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 13:48:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7b, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x79, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:14 executing program 0: [ 316.450695] IPVS: ftp: loaded support on port[0] = 21 [ 316.634908] IPVS: ftp: loaded support on port[0] = 21 13:48:14 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000040)=0xfffffffffffffe00) clone(0x1008000, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000100)={0x3, @random="405ee5784332"}) 13:48:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7a, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:14 executing program 1: 13:48:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37000000]}) 13:48:14 executing program 0: 13:48:14 executing program 1: 13:48:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7b, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:14 executing program 0: 13:48:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 13:48:14 executing program 1: 13:48:14 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:14 executing program 0: syz_execute_func(&(0x7f0000000100)="ba66440f50f564ff0941c335e2c9975842c4c27d79434e0000420fe2e33e0f111064f20f2ce24bd31919") mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) 13:48:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff84, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:14 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 13:48:15 executing program 1: syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") socket$packet(0x11, 0x0, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1a) r1 = dup2(r0, r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 13:48:15 executing program 0: syz_execute_func(&(0x7f0000000140)="3666440f50f564ff0941c30f5daf08000000c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x0, 0x0) r2 = dup2(r0, r1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 13:48:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x7d, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:15 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 13:48:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:15 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0x6) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file1\x00') ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, 0x0) 13:48:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff84, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 317.537019] [ 317.538695] ====================================================== [ 317.545004] WARNING: possible circular locking dependency detected [ 317.551316] 5.0.0-rc6 #67 Not tainted [ 317.555108] ------------------------------------------------------ [ 317.561422] syz-executor.1/17541 is trying to acquire lock: [ 317.567121] 00000000ec481256 (&pipe->mutex/1){+.+.}, at: fifo_open+0x159/0xb00 [ 317.573011] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 317.574673] [ 317.574673] but task is already holding lock: [ 317.574680] 00000000ce22737c (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 317.585537] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 317.587050] [ 317.587050] which lock already depends on the new lock. [ 317.587050] [ 317.587054] [ 317.587054] the existing dependency chain (in reverse order) is: [ 317.587058] [ 317.587058] -> #2 (&sig->cred_guard_mutex){+.+.}: [ 317.587089] __mutex_lock+0xf7/0x1310 [ 317.632391] mutex_lock_killable_nested+0x16/0x20 [ 317.637769] do_io_accounting+0x1f4/0x830 [ 317.642450] proc_tgid_io_accounting+0x23/0x30 [ 317.647548] proc_single_show+0xf6/0x180 [ 317.652125] seq_read+0x4db/0x1130 [ 317.656179] __vfs_read+0x116/0x8c0 [ 317.660322] vfs_read+0x194/0x3e0 [ 317.664294] ksys_pread64+0x183/0x1c0 [ 317.668612] __ia32_compat_sys_x86_pread+0xc4/0x130 [ 317.674149] do_fast_syscall_32+0x281/0xc98 [ 317.678992] entry_SYSENTER_compat+0x70/0x7f [ 317.683906] [ 317.683906] -> #1 (&p->lock){+.+.}: [ 317.689030] __mutex_lock+0xf7/0x1310 [ 317.693348] mutex_lock_nested+0x16/0x20 [ 317.697928] seq_read+0x71/0x1130 [ 317.701904] proc_reg_read+0x1fa/0x2c0 [ 317.706313] do_iter_read+0x4a9/0x660 [ 317.710630] vfs_readv+0xf0/0x160 [ 317.714599] default_file_splice_read+0x475/0x890 [ 317.719961] do_splice_to+0x12a/0x190 [ 317.724284] do_splice+0xf7c/0x1330 [ 317.728431] __ia32_sys_splice+0x2c4/0x330 [ 317.733182] do_fast_syscall_32+0x281/0xc98 [ 317.738008] entry_SYSENTER_compat+0x70/0x7f [ 317.742910] [ 317.742910] -> #0 (&pipe->mutex/1){+.+.}: [ 317.748527] lock_acquire+0x16f/0x3f0 [ 317.752837] __mutex_lock+0xf7/0x1310 [ 317.757139] mutex_lock_nested+0x16/0x20 [ 317.761715] fifo_open+0x159/0xb00 [ 317.765756] do_dentry_open+0x47d/0x1130 [ 317.770327] vfs_open+0xa0/0xd0 [ 317.774124] path_openat+0x10d7/0x4690 [ 317.778525] do_filp_open+0x1a1/0x280 [ 317.782837] do_open_execat+0x13b/0x6d0 [ 317.787312] __do_execve_file.isra.0+0x178d/0x23f0 [ 317.792782] __ia32_compat_sys_execve+0x94/0xc0 [ 317.797960] do_fast_syscall_32+0x281/0xc98 [ 317.802792] entry_SYSENTER_compat+0x70/0x7f [ 317.807701] [ 317.807701] other info that might help us debug this: [ 317.807701] [ 317.815827] Chain exists of: [ 317.815827] &pipe->mutex/1 --> &p->lock --> &sig->cred_guard_mutex [ 317.815827] [ 317.826644] Possible unsafe locking scenario: [ 317.826644] [ 317.832676] CPU0 CPU1 [ 317.837319] ---- ---- [ 317.841958] lock(&sig->cred_guard_mutex); [ 317.846256] lock(&p->lock); [ 317.851858] lock(&sig->cred_guard_mutex); [ 317.858679] lock(&pipe->mutex/1); [ 317.862311] [ 317.862311] *** DEADLOCK *** [ 317.862311] [ 317.868348] 1 lock held by syz-executor.1/17541: [ 317.873094] #0: 00000000ce22737c (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 317.882885] [ 317.882885] stack backtrace: [ 317.887361] CPU: 0 PID: 17541 Comm: syz-executor.1 Not tainted 5.0.0-rc6 #67 [ 317.894571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.903904] Call Trace: [ 317.906475] dump_stack+0x172/0x1f0 [ 317.910085] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 317.915433] __lock_acquire+0x2f00/0x4700 [ 317.919566] ? kasan_check_read+0x11/0x20 [ 317.923701] ? mark_held_locks+0x100/0x100 [ 317.927916] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 317.933000] ? kasan_kmalloc+0x9/0x10 [ 317.936785] ? __kmalloc+0x15c/0x740 [ 317.940483] ? vfs_open+0xa0/0xd0 [ 317.943917] ? path_openat+0x10d7/0x4690 [ 317.947956] ? do_filp_open+0x1a1/0x280 [ 317.951912] ? do_open_execat+0x13b/0x6d0 [ 317.956045] ? __do_execve_file.isra.0+0x178d/0x23f0 [ 317.961131] ? __ia32_compat_sys_execve+0x94/0xc0 [ 317.965954] ? do_fast_syscall_32+0x281/0xc98 [ 317.970430] ? __lock_is_held+0xb6/0x140 [ 317.974488] ? fifo_open+0x159/0xb00 [ 317.978182] lock_acquire+0x16f/0x3f0 [ 317.982053] ? fifo_open+0x159/0xb00 [ 317.985765] ? fifo_open+0x159/0xb00 [ 317.989466] __mutex_lock+0xf7/0x1310 [ 317.993247] ? fifo_open+0x159/0xb00 [ 317.996940] ? fifo_open+0x159/0xb00 [ 318.000634] ? __lock_is_held+0xb6/0x140 [ 318.004677] ? fifo_open+0x2b5/0xb00 [ 318.008379] ? mutex_trylock+0x1e0/0x1e0 [ 318.012432] ? fifo_open+0x2b5/0xb00 [ 318.016126] ? kasan_check_read+0x11/0x20 [ 318.020256] ? lock_downgrade+0x810/0x810 [ 318.024387] mutex_lock_nested+0x16/0x20 [ 318.028437] ? mutex_lock_nested+0x16/0x20 [ 318.032670] fifo_open+0x159/0xb00 [ 318.036198] do_dentry_open+0x47d/0x1130 [ 318.040241] ? pipe_release+0x280/0x280 [ 318.044215] ? chown_common+0x5c0/0x5c0 [ 318.048170] ? inode_permission+0xb4/0x570 [ 318.052386] vfs_open+0xa0/0xd0 [ 318.055648] path_openat+0x10d7/0x4690 [ 318.059523] ? __kernel_text_address+0xd/0x40 [ 318.064001] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 318.068656] ? save_stack+0xa9/0xd0 [ 318.072282] ? save_stack+0x45/0xd0 [ 318.075896] ? kmem_cache_alloc+0x12d/0x710 [ 318.080211] ? prepare_creds+0x3e/0x3c0 [ 318.084185] ? prepare_exec_creds+0x12/0xf0 [ 318.088538] ? __do_execve_file.isra.0+0x393/0x23f0 [ 318.093544] ? __ia32_compat_sys_execve+0x94/0xc0 [ 318.098364] do_filp_open+0x1a1/0x280 [ 318.102156] ? mark_held_locks+0x100/0x100 [ 318.106371] ? may_open_dev+0x100/0x100 [ 318.110327] ? find_held_lock+0x35/0x130 [ 318.114371] ? refcount_inc_not_zero_checked+0x147/0x200 [ 318.119807] ? refcount_add_not_zero_checked+0x240/0x240 [ 318.125248] ? __lock_is_held+0xb6/0x140 [ 318.129287] ? check_preemption_disabled+0x48/0x290 [ 318.134284] do_open_execat+0x13b/0x6d0 [ 318.138247] ? unregister_binfmt+0x170/0x170 [ 318.142669] ? lock_downgrade+0x810/0x810 [ 318.146815] ? kasan_check_read+0x11/0x20 [ 318.150963] ? do_raw_spin_unlock+0x57/0x270 [ 318.155377] __do_execve_file.isra.0+0x178d/0x23f0 [ 318.160311] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 318.165334] ? copy_strings_kernel+0x110/0x110 [ 318.169907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.175425] ? getname_flags+0x277/0x5b0 [ 318.179469] ? entry_SYSENTER_compat+0x70/0x7f [ 318.184033] __ia32_compat_sys_execve+0x94/0xc0 [ 318.188684] do_fast_syscall_32+0x281/0xc98 [ 318.193002] entry_SYSENTER_compat+0x70/0x7f [ 318.197405] RIP: 0023:0xf7fbd869 [ 318.200754] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 318.219669] RSP: 002b:00000000f5db90cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 318.227358] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000000000 13:48:16 executing program 2: r0 = userfaultfd(0x73cf85bdc4fbafdf) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:16 executing program 0: 13:48:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff87, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3700000000000000]}) [ 318.234623] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 318.241878] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 318.249372] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 318.256630] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 318.269720] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 318.276188] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:48:16 executing program 0: 13:48:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff94, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff87, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 318.329137] kobject: 'loop2' (00000000329f9801): kobject_uevent_env [ 318.362139] kobject: 'loop2' (00000000329f9801): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:48:16 executing program 0: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) [ 318.420059] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 318.426521] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 318.459171] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 318.474204] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 318.489361] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 318.495871] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 318.508100] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 318.514920] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 318.528602] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 318.535553] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 318.561495] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 318.567953] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 318.577857] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 318.584367] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:48:16 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0x6) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file1\x00') ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, 0x0) 13:48:16 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x10000000, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) setrlimit(0xf, &(0x7f0000000040)={0x5c, 0x5}) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff95, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37]}) 13:48:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff94, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff95, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff97, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 318.644377] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env 13:48:16 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) [ 318.719967] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:48:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff9c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff97, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:16 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3700]}) [ 318.769660] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 318.804119] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:48:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff9c, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 318.837401] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 318.853697] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 318.891279] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 318.912451] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 318.924378] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 318.934216] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 318.934345] kobject: 'rx-0' (00000000f804f16f): kobject_cleanup, parent 000000003fb428f0 [ 318.944150] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 318.955135] kobject: 'rx-0' (00000000f804f16f): auto cleanup 'remove' event [ 318.959141] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 318.965815] kobject: 'rx-0' (00000000f804f16f): kobject_uevent_env [ 318.975703] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 318.981770] kobject: 'rx-0' (00000000f804f16f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 318.990474] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 318.998241] kobject: 'rx-0' (00000000f804f16f): auto cleanup kobject_del [ 319.014284] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 319.015501] kobject: 'rx-0' (00000000f804f16f): calling ktype release [ 319.027477] kobject: 'rx-0': free name [ 319.028171] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 319.038314] kobject: 'tx-0' (00000000c762e9ca): kobject_cleanup, parent 000000003fb428f0 [ 319.043502] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 319.049302] kobject: 'tx-0' (00000000c762e9ca): auto cleanup 'remove' event [ 319.059896] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 319.063157] kobject: 'tx-0' (00000000c762e9ca): kobject_uevent_env 13:48:16 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0x6) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file1\x00') ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, 0x0) [ 319.086217] kobject: 'tx-0' (00000000c762e9ca): kobject_uevent_env: uevent_suppress caused the event to drop! [ 319.110589] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env [ 319.117037] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 319.123769] kobject: 'tx-0' (00000000c762e9ca): auto cleanup kobject_del [ 319.148126] kobject: 'tx-0' (00000000c762e9ca): calling ktype release [ 319.164529] kobject: 'tx-0': free name [ 319.173000] kobject: 'queues' (000000003fb428f0): kobject_cleanup, parent (null) [ 319.181949] kobject: 'queues' (000000003fb428f0): calling ktype release [ 319.188839] kobject: 'queues' (000000003fb428f0): kset_release [ 319.194828] kobject: 'queues': free name [ 319.199234] kobject: 'ip6gre0' (0000000085707119): kobject_uevent_env [ 319.205816] kobject: 'ip6gre0' (0000000085707119): kobject_uevent_env: uevent_suppress caused the event to drop! [ 319.248519] kobject: 'ip6gre0' (0000000085707119): kobject_cleanup, parent (null) [ 319.257049] kobject: 'ip6gre0' (0000000085707119): auto cleanup 'remove' event [ 319.265846] kobject: 'ip6gre0' (0000000085707119): kobject_uevent_env [ 319.272458] kobject: 'ip6gre0' (0000000085707119): kobject_uevent_env: uevent_suppress caused the event to drop! [ 319.282864] kobject: 'ip6gre0' (0000000085707119): calling ktype release [ 319.289757] kobject: 'ip6gre0': free name [ 319.294570] kobject: 'rx-0' (000000005c7723eb): kobject_cleanup, parent 00000000ab07bbe1 [ 319.302841] kobject: 'rx-0' (000000005c7723eb): auto cleanup 'remove' event [ 319.309968] kobject: 'rx-0' (000000005c7723eb): kobject_uevent_env [ 319.316276] kobject: 'rx-0' (000000005c7723eb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 319.326342] kobject: 'rx-0' (000000005c7723eb): auto cleanup kobject_del [ 319.333239] kobject: 'rx-0' (000000005c7723eb): calling ktype release [ 319.339871] kobject: 'rx-0': free name [ 319.343802] kobject: 'tx-0' (00000000ab819a25): kobject_cleanup, parent 00000000ab07bbe1 [ 319.352075] kobject: 'tx-0' (00000000ab819a25): auto cleanup 'remove' event [ 319.359203] kobject: 'tx-0' (00000000ab819a25): kobject_uevent_env [ 319.365519] kobject: 'tx-0' (00000000ab819a25): kobject_uevent_env: uevent_suppress caused the event to drop! [ 319.376076] kobject: 'tx-0' (00000000ab819a25): auto cleanup kobject_del [ 319.379732] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env [ 319.383052] kobject: 'tx-0' (00000000ab819a25): calling ktype release [ 319.394517] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 319.395954] kobject: 'tx-0': free name [ 319.395978] kobject: 'queues' (00000000ab07bbe1): kobject_cleanup, parent (null) [ 319.395989] kobject: 'queues' (00000000ab07bbe1): calling ktype release [ 319.424549] kobject: 'queues' (00000000ab07bbe1): kset_release [ 319.430562] kobject: 'queues': free name [ 319.434807] kobject: 'ip6tnl0' (000000001eeee94a): kobject_uevent_env 13:48:17 executing program 0: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) 13:48:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff9f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:17 executing program 2: r0 = userfaultfd(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000100)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) socket$bt_cmtp(0x1f, 0x3, 0x5) rmdir(&(0x7f0000000040)='./file1\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:17 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 13:48:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff9f, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:17 executing program 1: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) [ 319.441556] kobject: 'ip6tnl0' (000000001eeee94a): kobject_uevent_env: uevent_suppress caused the event to drop! 13:48:17 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37000000]}) [ 319.484754] kobject: 'loop2' (00000000329f9801): kobject_uevent_env [ 319.507344] kobject: 'loop2' (00000000329f9801): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 319.517097] kobject: 'ip6tnl0' (000000001eeee94a): kobject_cleanup, parent (null) [ 319.525340] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env 13:48:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffa4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 319.533008] kobject: 'ip6tnl0' (000000001eeee94a): auto cleanup 'remove' event [ 319.540645] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 319.552573] kobject: 'ip6tnl0' (000000001eeee94a): kobject_uevent_env [ 319.574310] kobject: 'ip6tnl0' (000000001eeee94a): kobject_uevent_env: uevent_suppress caused the event to drop! 13:48:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffa4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 319.589863] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 319.606721] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 319.617489] kobject: 'ip6tnl0' (000000001eeee94a): calling ktype release 13:48:17 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 13:48:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffa5, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffa5, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 319.637640] kobject: 'ip6tnl0': free name [ 319.651948] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 319.663333] kobject: 'rx-0' (000000002373531b): kobject_cleanup, parent 0000000034166304 [ 319.675685] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 319.693658] kobject: 'rx-0' (000000002373531b): auto cleanup 'remove' event [ 319.702757] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 319.712870] kobject: 'rx-0' (000000002373531b): kobject_uevent_env [ 319.720593] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 319.733244] kobject: 'rx-0' (000000002373531b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 319.748371] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 319.755037] kobject: 'rx-0' (000000002373531b): auto cleanup kobject_del [ 319.768753] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 319.780531] kobject: 'rx-0' (000000002373531b): calling ktype release [ 319.787280] kobject: 'rx-0': free name [ 319.795762] kobject: 'tx-0' (00000000635584b6): kobject_cleanup, parent 0000000034166304 [ 319.804289] kobject: 'tx-0' (00000000635584b6): auto cleanup 'remove' event [ 319.811822] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 319.820772] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 319.837121] kobject: 'tx-0' (00000000635584b6): kobject_uevent_env [ 319.854913] kobject: 'tx-0' (00000000635584b6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 319.877239] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 319.886069] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:48:17 executing program 0: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) 13:48:17 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 319.901073] kobject: 'tx-0' (00000000635584b6): auto cleanup kobject_del [ 319.914294] kobject: 'tx-0' (00000000635584b6): calling ktype release [ 319.924742] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env [ 319.930433] kobject: 'tx-0': free name [ 319.931491] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 319.947122] kobject: 'queues' (0000000034166304): kobject_cleanup, parent (null) [ 319.948211] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 319.964903] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 319.978615] kobject: 'queues' (0000000034166304): calling ktype release [ 319.996167] kobject: 'queues' (0000000034166304): kset_release [ 320.003304] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 320.006332] kobject: 'queues': free name [ 320.012725] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 320.015967] kobject: 'sit0' (00000000cf513918): kobject_uevent_env [ 320.030137] kobject: 'sit0' (00000000cf513918): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.088972] kobject: 'sit0' (00000000cf513918): kobject_cleanup, parent (null) [ 320.097338] kobject: 'sit0' (00000000cf513918): auto cleanup 'remove' event [ 320.106153] kobject: 'sit0' (00000000cf513918): kobject_uevent_env [ 320.108289] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 320.113816] kobject: 'sit0' (00000000cf513918): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.119246] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 320.131459] kobject: 'sit0' (00000000cf513918): calling ktype release [ 320.145282] kobject: 'sit0': free name [ 320.152291] kobject: 'rx-0' (000000005f5ad9dd): kobject_cleanup, parent 00000000b65ece20 [ 320.160608] kobject: 'rx-0' (000000005f5ad9dd): auto cleanup 'remove' event [ 320.167707] kobject: 'rx-0' (000000005f5ad9dd): kobject_uevent_env [ 320.174079] kobject: 'rx-0' (000000005f5ad9dd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.184153] kobject: 'rx-0' (000000005f5ad9dd): auto cleanup kobject_del [ 320.191162] kobject: 'rx-0' (000000005f5ad9dd): calling ktype release [ 320.197738] kobject: 'rx-0': free name [ 320.201672] kobject: 'tx-0' (000000009d619dc7): kobject_cleanup, parent 00000000b65ece20 [ 320.209919] kobject: 'tx-0' (000000009d619dc7): auto cleanup 'remove' event [ 320.216997] kobject: 'tx-0' (000000009d619dc7): kobject_uevent_env [ 320.223324] kobject: 'tx-0' (000000009d619dc7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.233402] kobject: 'tx-0' (000000009d619dc7): auto cleanup kobject_del [ 320.240425] kobject: 'tx-0' (000000009d619dc7): calling ktype release [ 320.246995] kobject: 'tx-0': free name [ 320.250950] kobject: 'queues' (00000000b65ece20): kobject_cleanup, parent (null) [ 320.259396] kobject: 'queues' (00000000b65ece20): calling ktype release [ 320.266140] kobject: 'queues' (00000000b65ece20): kset_release [ 320.272125] kobject: 'queues': free name [ 320.276356] kobject: 'ip6_vti0' (00000000d1b7686a): kobject_uevent_env [ 320.283053] kobject: 'ip6_vti0' (00000000d1b7686a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.328461] kobject: 'ip6_vti0' (00000000d1b7686a): kobject_cleanup, parent (null) [ 320.337051] kobject: 'ip6_vti0' (00000000d1b7686a): auto cleanup 'remove' event [ 320.344555] kobject: 'ip6_vti0' (00000000d1b7686a): kobject_uevent_env [ 320.351272] kobject: 'ip6_vti0' (00000000d1b7686a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.361838] kobject: 'ip6_vti0' (00000000d1b7686a): calling ktype release [ 320.369454] kobject: 'ip6_vti0': free name 13:48:18 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/100, 0xffe4) 13:48:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffa7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffa7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:18 executing program 1: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) 13:48:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 13:48:18 executing program 0: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) [ 320.379348] kobject: 'rx-0' (000000003ece1f15): kobject_cleanup, parent 00000000a0dce9cf [ 320.387594] kobject: 'rx-0' (000000003ece1f15): auto cleanup 'remove' event [ 320.394737] kobject: 'rx-0' (000000003ece1f15): kobject_uevent_env [ 320.401097] kobject: 'rx-0' (000000003ece1f15): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.411236] kobject: 'rx-0' (000000003ece1f15): auto cleanup kobject_del [ 320.418512] kobject: 'rx-0' (000000003ece1f15): calling ktype release 13:48:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffac, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 320.442411] kobject: 'rx-0': free name [ 320.445576] kobject: 'loop2' (00000000329f9801): kobject_uevent_env [ 320.448200] kobject: 'tx-0' (000000001faf6274): kobject_cleanup, parent 00000000a0dce9cf [ 320.461736] kobject: 'loop2' (00000000329f9801): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 320.478461] kobject: 'tx-0' (000000001faf6274): auto cleanup 'remove' event [ 320.485573] kobject: 'tx-0' (000000001faf6274): kobject_uevent_env 13:48:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffac, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3700000000000000]}) [ 320.502808] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 320.510076] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 320.522647] kobject: 'tx-0' (000000001faf6274): kobject_uevent_env: uevent_suppress caused the event to drop! 13:48:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffad, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 320.547904] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 320.564297] kobject: 'tx-0' (000000001faf6274): auto cleanup kobject_del [ 320.575656] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 320.595295] kobject: 'tx-0' (000000001faf6274): calling ktype release 13:48:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffad, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 320.619497] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 320.626055] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 320.639990] kobject: 'tx-0': free name [ 320.643929] kobject: 'queues' (00000000a0dce9cf): kobject_cleanup, parent (null) 13:48:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 13:48:18 executing program 2: r0 = semget(0x3, 0x1, 0x200) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000580)={{0x8, r1, r2, r3, r4, 0x42, 0x5}, 0x8, 0xffff, 0x7fffffff}) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$IMHOLD_L1(r6, 0x80044948, &(0x7f0000000180)=0x20000000000080) ioctl$UFFDIO_UNREGISTER(r5, 0x8010aa01, &(0x7f0000000640)={&(0x7f00004b7000/0x4000)=nil, 0x4000}) setsockopt$bt_BT_VOICE(r6, 0x112, 0xb, &(0x7f0000000600)=0x3, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000680)={0x0, 0x7fff, 0x80000000}, &(0x7f00000006c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000700)={r7, 0x8}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000780), &(0x7f00000007c0)=0x4) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000100)={0x7, 0x1, 0x7fffffff}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) r8 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xce32, 0x100) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r8, 0xc0045516, &(0x7f00000005c0)=0xffffffffffffffff) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r5, &(0x7f0000000380)=""/100, 0xffe4) [ 320.669632] kobject: 'queues' (00000000a0dce9cf): calling ktype release [ 320.682474] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 320.695193] kobject: 'queues' (00000000a0dce9cf): kset_release [ 320.708936] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:48:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffaf, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffaf, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 320.716876] kobject: 'queues': free name [ 320.734193] kobject: 'ip_vti0' (000000002dd8c3e7): kobject_uevent_env [ 320.760817] kobject: 'ip_vti0' (000000002dd8c3e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.767356] kobject: 'loop2' (00000000329f9801): kobject_uevent_env 13:48:18 executing program 1: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) 13:48:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37]}) [ 320.821127] kobject: 'loop2' (00000000329f9801): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 320.830766] kobject: 'ip_vti0' (000000002dd8c3e7): kobject_cleanup, parent (null) [ 320.841980] kobject: 'ip_vti0' (000000002dd8c3e7): auto cleanup 'remove' event [ 320.858031] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env 13:48:18 executing program 0: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) 13:48:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) [ 320.866862] kobject: 'ip_vti0' (000000002dd8c3e7): kobject_uevent_env [ 320.881650] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 320.883035] kobject: 'ip_vti0' (000000002dd8c3e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 320.897137] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 320.901935] kobject: 'ip_vti0' (000000002dd8c3e7): calling ktype release [ 320.910430] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:48:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3700]}) [ 320.951580] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 320.958007] kobject: 'ip_vti0': free name [ 320.963605] kobject: 'batman_adv' (0000000076ba71ab): kobject_uevent_env [ 320.976262] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 320.987858] kobject: 'batman_adv' (0000000076ba71ab): kobject_uevent_env: filter function caused the event to drop! [ 321.005712] kobject: 'batman_adv' (0000000076ba71ab): kobject_cleanup, parent (null) [ 321.015218] kobject: 'batman_adv' (0000000076ba71ab): calling ktype release [ 321.024916] kobject: (0000000076ba71ab): dynamic_kobj_release [ 321.031387] kobject: 'batman_adv': free name [ 321.036270] kobject: 'rx-0' (00000000f0f3844c): kobject_cleanup, parent 00000000d39e8ecb [ 321.046540] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env 13:48:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb5, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 321.053396] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 321.063214] kobject: 'rx-0' (00000000f0f3844c): auto cleanup 'remove' event [ 321.070685] kobject: 'rx-0' (00000000f0f3844c): kobject_uevent_env [ 321.082940] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env [ 321.092957] kobject: 'rx-0' (00000000f0f3844c): kobject_uevent_env: uevent_suppress caused the event to drop! 13:48:18 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) [ 321.104377] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 321.119193] kobject: 'rx-0' (00000000f0f3844c): auto cleanup kobject_del [ 321.130700] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 321.146312] kobject: 'rx-0' (00000000f0f3844c): calling ktype release [ 321.155450] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 321.167078] kobject: 'rx-0': free name [ 321.174592] kobject: 'tx-0' (0000000054796f49): kobject_cleanup, parent 00000000d39e8ecb [ 321.184539] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 321.192055] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 321.200638] kobject: 'tx-0' (0000000054796f49): auto cleanup 'remove' event [ 321.206096] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 321.216361] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 321.218643] kobject: 'tx-0' (0000000054796f49): kobject_uevent_env [ 321.235446] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 321.242293] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 321.252071] kobject: 'tx-0' (0000000054796f49): kobject_uevent_env: uevent_suppress caused the event to drop! [ 321.262973] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 321.272002] kobject: 'tx-0' (0000000054796f49): auto cleanup kobject_del [ 321.278938] kobject: 'tx-0' (0000000054796f49): calling ktype release [ 321.284156] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 321.285553] kobject: 'tx-0': free name [ 321.301622] kobject: 'queues' (00000000d39e8ecb): kobject_cleanup, parent (null) [ 321.303350] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 321.310127] kobject: 'queues' (00000000d39e8ecb): calling ktype release [ 321.310135] kobject: 'queues' (00000000d39e8ecb): kset_release [ 321.310144] kobject: 'queues': free name [ 321.310449] kobject: 'erspan0' (00000000a3403e94): kobject_uevent_env [ 321.321386] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 321.325726] kobject: 'erspan0' (00000000a3403e94): kobject_uevent_env: uevent_suppress caused the event to drop! [ 321.330634] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 321.366314] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 321.376425] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 321.382985] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 321.393367] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 321.399829] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 321.412014] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env [ 321.418497] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 321.432225] kobject: 'erspan0' (00000000a3403e94): kobject_cleanup, parent (null) [ 321.456055] kobject: 'erspan0' (00000000a3403e94): auto cleanup 'remove' event [ 321.469840] kobject: 'erspan0' (00000000a3403e94): kobject_uevent_env [ 321.478672] kobject: 'erspan0' (00000000a3403e94): kobject_uevent_env: uevent_suppress caused the event to drop! [ 321.501452] kobject: 'erspan0' (00000000a3403e94): calling ktype release [ 321.508664] kobject: 'erspan0': free name [ 321.513794] kobject: 'batman_adv' (000000006dc7a5fd): kobject_uevent_env [ 321.528355] kobject: 'batman_adv' (000000006dc7a5fd): kobject_uevent_env: filter function caused the event to drop! [ 321.539421] kobject: 'batman_adv' (000000006dc7a5fd): kobject_cleanup, parent (null) [ 321.548181] kobject: 'batman_adv' (000000006dc7a5fd): calling ktype release 13:48:19 executing program 2: r0 = semget$private(0x0, 0x3, 0x29a) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000180)=""/231) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000100), 0x8) r2 = userfaultfd(0x80800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) read(r2, &(0x7f0000000380)=""/100, 0xffe4) syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0xfffffffffffff801, 0x80000) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4004700e, 0x7ff) 13:48:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb5, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:19 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37000000]}) 13:48:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffbc, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:19 executing program 0: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:48:19 executing program 1: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) [ 321.559354] kobject: (000000006dc7a5fd): dynamic_kobj_release [ 321.574137] kobject: 'batman_adv': free name [ 321.579010] kobject: 'rx-0' (00000000658ae00f): kobject_cleanup, parent 00000000776ea39d [ 321.597374] kobject: 'rx-0' (00000000658ae00f): auto cleanup 'remove' event [ 321.608811] kobject: 'loop2' (00000000329f9801): kobject_uevent_env [ 321.615269] kobject: 'loop2' (00000000329f9801): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 321.642475] kobject: 'rx-0' (00000000658ae00f): kobject_uevent_env 13:48:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffbc, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffbd, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 321.668187] kobject: 'rx-0' (00000000658ae00f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 321.693450] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 321.701181] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:48:19 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 321.716019] kobject: 'rx-0' (00000000658ae00f): auto cleanup kobject_del 13:48:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffbd, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 321.742614] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 321.742720] kobject: 'rx-0' (00000000658ae00f): calling ktype release [ 321.772497] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 321.774271] kobject: 'rx-0': free name 13:48:19 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 321.801610] kobject: 'tx-0' (000000005fbefa08): kobject_cleanup, parent 00000000776ea39d [ 321.808361] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 321.823298] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 321.830945] kobject: 'tx-0' (000000005fbefa08): auto cleanup 'remove' event [ 321.857863] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 321.880500] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 321.880873] kobject: 'tx-0' (000000005fbefa08): kobject_uevent_env [ 321.908576] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 321.924856] kobject: 'tx-0' (000000005fbefa08): kobject_uevent_env: uevent_suppress caused the event to drop! [ 321.925205] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 321.949049] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 321.955873] kobject: 'tx-0' (000000005fbefa08): auto cleanup kobject_del [ 321.960913] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 321.968490] kobject: 'tx-0' (000000005fbefa08): calling ktype release [ 321.973639] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 321.987559] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 321.997963] kobject: 'tx-0': free name [ 322.002945] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 322.006121] kobject: 'queues' (00000000776ea39d): kobject_cleanup, parent (null) [ 322.009914] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 322.021975] kobject: 'queues' (00000000776ea39d): calling ktype release [ 322.028968] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env [ 322.036903] kobject: 'queues' (00000000776ea39d): kset_release [ 322.040862] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 322.046491] kobject: 'queues': free name [ 322.058029] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 322.067351] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 322.076256] kobject: 'gretap0' (000000002b126a9f): kobject_uevent_env [ 322.085277] kobject: 'gretap0' (000000002b126a9f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.128669] kobject: 'gretap0' (000000002b126a9f): kobject_cleanup, parent (null) [ 322.137236] kobject: 'gretap0' (000000002b126a9f): auto cleanup 'remove' event [ 322.146014] kobject: 'gretap0' (000000002b126a9f): kobject_uevent_env [ 322.153171] kobject: 'gretap0' (000000002b126a9f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.163504] kobject: 'gretap0' (000000002b126a9f): calling ktype release [ 322.170408] kobject: 'gretap0': free name [ 322.174958] kobject: 'rx-0' (0000000060a9009b): kobject_cleanup, parent 00000000b28d4c01 [ 322.183209] kobject: 'rx-0' (0000000060a9009b): auto cleanup 'remove' event [ 322.190355] kobject: 'rx-0' (0000000060a9009b): kobject_uevent_env [ 322.196661] kobject: 'rx-0' (0000000060a9009b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.206766] kobject: 'rx-0' (0000000060a9009b): auto cleanup kobject_del [ 322.213897] kobject: 'rx-0' (0000000060a9009b): calling ktype release [ 322.220499] kobject: 'rx-0': free name [ 322.224410] kobject: 'tx-0' (00000000f4d0604f): kobject_cleanup, parent 00000000b28d4c01 [ 322.232651] kobject: 'tx-0' (00000000f4d0604f): auto cleanup 'remove' event [ 322.240078] kobject: 'tx-0' (00000000f4d0604f): kobject_uevent_env [ 322.246394] kobject: 'tx-0' (00000000f4d0604f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.256455] kobject: 'tx-0' (00000000f4d0604f): auto cleanup kobject_del [ 322.263349] kobject: 'tx-0' (00000000f4d0604f): calling ktype release [ 322.269959] kobject: 'tx-0': free name [ 322.273851] kobject: 'queues' (00000000b28d4c01): kobject_cleanup, parent (null) [ 322.282261] kobject: 'queues' (00000000b28d4c01): calling ktype release [ 322.289036] kobject: 'queues' (00000000b28d4c01): kset_release [ 322.294997] kobject: 'queues': free name [ 322.299406] kobject: 'gre0' (000000006a258a08): kobject_uevent_env [ 322.305720] kobject: 'gre0' (000000006a258a08): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.338480] kobject: 'gre0' (000000006a258a08): kobject_cleanup, parent (null) [ 322.346730] kobject: 'gre0' (000000006a258a08): auto cleanup 'remove' event [ 322.353910] kobject: 'gre0' (000000006a258a08): kobject_uevent_env [ 322.360243] kobject: 'gre0' (000000006a258a08): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.370316] kobject: 'gre0' (000000006a258a08): calling ktype release [ 322.376906] kobject: 'gre0': free name [ 322.381284] kobject: 'rx-0' (0000000096449ff9): kobject_cleanup, parent 000000001fe8de4d [ 322.389552] kobject: 'rx-0' (0000000096449ff9): auto cleanup 'remove' event [ 322.396641] kobject: 'rx-0' (0000000096449ff9): kobject_uevent_env [ 322.402986] kobject: 'rx-0' (0000000096449ff9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.413128] kobject: 'rx-0' (0000000096449ff9): auto cleanup kobject_del [ 322.420117] kobject: 'rx-0' (0000000096449ff9): calling ktype release [ 322.426717] kobject: 'rx-0': free name [ 322.430742] kobject: 'tx-0' (00000000c7e156f1): kobject_cleanup, parent 000000001fe8de4d [ 322.439031] kobject: 'tx-0' (00000000c7e156f1): auto cleanup 'remove' event [ 322.446146] kobject: 'tx-0' (00000000c7e156f1): kobject_uevent_env [ 322.452492] kobject: 'tx-0' (00000000c7e156f1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.462750] kobject: 'tx-0' (00000000c7e156f1): auto cleanup kobject_del [ 322.469679] kobject: 'tx-0' (00000000c7e156f1): calling ktype release [ 322.476280] kobject: 'tx-0': free name [ 322.480199] kobject: 'queues' (000000001fe8de4d): kobject_cleanup, parent (null) 13:48:20 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) getdents(r0, &(0x7f0000000040)=""/44, 0x2c) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:20 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 13:48:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffc3, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:20 executing program 1: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:48:20 executing program 0: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) dup2(r2, r2) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 322.488631] kobject: 'queues' (000000001fe8de4d): calling ktype release [ 322.495383] kobject: 'queues' (000000001fe8de4d): kset_release [ 322.501374] kobject: 'queues': free name [ 322.505617] kobject: 'tunl0' (000000001b9c5e57): kobject_uevent_env [ 322.512074] kobject: 'tunl0' (000000001b9c5e57): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.551304] kobject: 'loop2' (00000000329f9801): kobject_uevent_env [ 322.557766] kobject: 'loop2' (00000000329f9801): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 322.581332] kobject: 'tunl0' (000000001b9c5e57): kobject_cleanup, parent (null) 13:48:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffc3, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:20 executing program 0: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:48:20 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3700000000000000]}) [ 322.604234] kobject: 'tunl0' (000000001b9c5e57): auto cleanup 'remove' event [ 322.615416] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 322.643383] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:48:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffc4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffc4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffc5, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 322.654071] kobject: 'tunl0' (000000001b9c5e57): kobject_uevent_env [ 322.682696] kobject: 'tunl0' (000000001b9c5e57): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.697201] kobject: 'loop0' (00000000cf3bc479): kobject_uevent_env [ 322.713223] kobject: 'loop0' (00000000cf3bc479): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 322.725390] kobject: 'tunl0' (000000001b9c5e57): calling ktype release [ 322.748001] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 322.754930] kobject: 'tunl0': free name [ 322.763924] kobject: 'rx-0' (000000002c380dfb): kobject_cleanup, parent 0000000060b08987 [ 322.773490] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 322.780703] kobject: 'rx-0' (000000002c380dfb): auto cleanup 'remove' event [ 322.801486] kobject: 'rx-0' (000000002c380dfb): kobject_uevent_env [ 322.812468] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 322.815706] kobject: 'rx-0' (000000002c380dfb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.828126] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 322.842931] kobject: 'rx-0' (000000002c380dfb): auto cleanup kobject_del [ 322.857789] kobject: 'rx-0' (000000002c380dfb): calling ktype release [ 322.864158] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 322.872231] kobject: 'rx-0': free name [ 322.880241] kobject: 'tx-0' (00000000bf2afba3): kobject_cleanup, parent 0000000060b08987 [ 322.890972] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 322.895958] kobject: 'tx-0' (00000000bf2afba3): auto cleanup 'remove' event [ 322.913697] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 322.914113] kobject: 'tx-0' (00000000bf2afba3): kobject_uevent_env [ 322.923888] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 322.935004] kobject: 'tx-0' (00000000bf2afba3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 322.947836] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 322.957001] kobject: 'tx-0' (00000000bf2afba3): auto cleanup kobject_del [ 322.957615] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 322.968434] kobject: 'tx-0' (00000000bf2afba3): calling ktype release [ 322.986970] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env [ 322.987858] kobject: 'tx-0': free name [ 323.000770] kobject: 'queues' (0000000060b08987): kobject_cleanup, parent (null) [ 323.003139] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 323.011466] kobject: 'queues' (0000000060b08987): calling ktype release [ 323.028482] kobject: 'queues' (0000000060b08987): kset_release [ 323.035619] kobject: 'queues': free name [ 323.041201] kobject: 'lo' (00000000d96daaea): kobject_uevent_env [ 323.049633] kobject: 'lo' (00000000d96daaea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 323.109107] kobject: 'lo' (00000000d96daaea): kobject_cleanup, parent (null) [ 323.117208] kobject: 'lo' (00000000d96daaea): auto cleanup 'remove' event [ 323.127004] kobject: 'lo' (00000000d96daaea): kobject_uevent_env [ 323.134823] kobject: 'lo' (00000000d96daaea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 323.147590] kobject: 'lo' (00000000d96daaea): calling ktype release [ 323.154293] kobject: 'lo': free name [ 323.230747] kobject: 'batman_adv' (00000000bede8127): kobject_uevent_env [ 323.237611] kobject: 'batman_adv' (00000000bede8127): kobject_uevent_env: filter function caused the event to drop! [ 323.248265] kobject: 'batman_adv' (00000000bede8127): kobject_cleanup, parent (null) [ 323.257049] kobject: 'batman_adv' (00000000bede8127): calling ktype release [ 323.264180] kobject: (00000000bede8127): dynamic_kobj_release [ 323.270430] kobject: 'batman_adv': free name [ 323.274959] kobject: 'rx-0' (00000000b0186df3): kobject_cleanup, parent 00000000017a700a [ 323.283227] kobject: 'rx-0' (00000000b0186df3): auto cleanup 'remove' event [ 323.290490] kobject: 'rx-0' (00000000b0186df3): kobject_uevent_env [ 323.296822] kobject: 'rx-0' (00000000b0186df3): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 323.307317] kobject: 'rx-0' (00000000b0186df3): auto cleanup kobject_del [ 323.314229] kobject: 'rx-0' (00000000b0186df3): calling ktype release [ 323.320846] kobject: 'rx-0': free name [ 323.324773] kobject: 'tx-0' (00000000aa833814): kobject_cleanup, parent 00000000017a700a [ 323.333032] kobject: 'tx-0' (00000000aa833814): auto cleanup 'remove' event [ 323.340165] kobject: 'tx-0' (00000000aa833814): kobject_uevent_env [ 323.346485] kobject: 'tx-0' (00000000aa833814): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 323.356985] kobject: 'tx-0' (00000000aa833814): auto cleanup kobject_del [ 323.363904] kobject: 'tx-0' (00000000aa833814): calling ktype release [ 323.370715] kobject: 'tx-0': free name 13:48:21 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x2}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/93, 0x5d) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x4000)=nil, 0x4000}, 0x1}) setrlimit(0x7, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sigaltstack(&(0x7f00004b7000/0x2000)=nil, 0x0) read(r0, &(0x7f0000000380)=""/100, 0xffe4) 13:48:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffc5, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:21 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 13:48:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffc7, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:21 executing program 1: mknod(0x0, 0x1042, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 323.374621] kobject: 'queues' (00000000017a700a): kobject_cleanup, parent (null) [ 323.383042] kobject: 'queues' (00000000017a700a): calling ktype release [ 323.389816] kobject: 'queues' (00000000017a700a): kset_release [ 323.395768] kobject: 'queues': free name [ 323.400290] kobject: 'syz_tun' (00000000baafcf71): kobject_uevent_env [ 323.406897] kobject: 'syz_tun' (00000000baafcf71): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 323.436995] kobject: 'loop2' (00000000329f9801): kobject_uevent_env [ 323.454807] kobject: 'loop2' (00000000329f9801): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:48:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffcc, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 13:48:21 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x19%\x15\x85\xb4\x1e\xcfx\xbe\xed\xc0w\xd0\xfbH%\xc6\x04\xf82L\xa0 \xfe@\xdf\xf9\x9fO8P\xd4\\\x10\x8crgn\xff\xb0\xfd\x05\xfd#\x0e>\xfe\xdf\xef\x9dx\xc6\xfb\xc1\xa2\xd3\xdd\x95D\xa29Vs\xa1t\x9e@7\xb2eBkHQ\xc7\\q\x9e\xee[\x05,\x96\xbdxSi\x1c\x91\x15\x81\xc8b\xdd\xbc\xf8\t%\xc4\xc1\xbec\xd1\xd9/\xb9y?l\xee?8\xe6X\xeb\xbd\xabMH\x80t\x80R\xac==\xcd\xe6\x88\x12*\xd8\x93\v\x88\xe0UZ\xa8\xa3Zh\xf29\xbd\xa1q\x05}n\\\x9a1\x8c\xa2\xfa`+\xe4{\xe1+c|4\xac\x84\xbb,\xf3\x82J\x1b\xde\xd9\xcd\xad/\x9e\x04$', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,\x01\x00\x01\x00\v\x01O\x9f\x91\xee\xb7\xc3\x8b\xc8u\xa7v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x32, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14, ',[wlan0+security!\'/^'}}, 0x32) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37]}) [ 323.479826] kobject: 'syz_tun' (00000000baafcf71): kobject_cleanup, parent (null) [ 323.488334] kobject: 'syz_tun' (00000000baafcf71): calling ktype release [ 323.499797] kobject: 'loop3' (00000000f5fb19f0): kobject_uevent_env [ 323.506242] kobject: 'loop3' (00000000f5fb19f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 323.541697] kobject: 'loop5' (000000000ff619c1): kobject_uevent_env [ 323.551211] kobject: 'syz_tun': free name [ 323.554978] kobject: 'loop5' (000000000ff619c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 323.568235] kobject: 'loop4' (00000000e95617d3): kobject_uevent_env [ 323.618456] kobject: 'loop4' (00000000e95617d3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 323.694851] kobject: 'loop1' (000000004d8e861b): kobject_uevent_env [ 323.708440] kobject: 'loop1' (000000004d8e861b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 324.343358] kobject: 'loop2' (00000000329f9801): kobject_uevent_env [ 324.350899] kobject: 'loop2' (00000000329f9801): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 324.549327] kobject: 'rx-0' (00000000d5d98466): kobject_cleanup, parent 00000000c29b754a [ 324.557593] kobject: 'rx-0' (00000000d5d98466): auto cleanup 'remove' event [ 324.564721] kobject: 'rx-0' (00000000d5d98466): kobject_uevent_env [ 324.571326] kobject: 'rx-0' (00000000d5d98466): kobject_uevent_env: uevent_suppress caused the event to drop! [ 324.581418] kobject: 'rx-0' (00000000d5d98466): auto cleanup kobject_del [ 324.588262] kobject: 'rx-0' (00000000d5d98466): calling ktype release [ 324.595105] kobject: 'rx-0': free name [ 324.599047] kobject: 'tx-0' (00000000d99833f9): kobject_cleanup, parent 00000000c29b754a [ 324.607267] kobject: 'tx-0' (00000000d99833f9): auto cleanup 'remove' event [ 324.614391] kobject: 'tx-0' (00000000d99833f9): kobject_uevent_env [ 324.620720] kobject: 'tx-0' (00000000d99833f9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 324.630793] kobject: 'tx-0' (00000000d99833f9): auto cleanup kobject_del [ 324.637642] kobject: 'tx-0' (00000000d99833f9): calling ktype release [ 324.644238] kobject: 'tx-0': free name [ 324.648132] kobject: 'queues' (00000000c29b754a): kobject_cleanup, parent (null) [ 324.656551] kobject: 'queues' (00000000c29b754a): calling ktype release [ 324.663318] kobject: 'queues' (00000000c29b754a): kset_release [ 324.669318] kobject: 'queues': free name [ 324.673561] kobject: 'ip6gre0' (000000003bbd776f): kobject_uevent_env [ 324.680157] kobject: 'ip6gre0' (000000003bbd776f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 324.691214] kobject: 'batman_adv' (000000008e639743): kobject_uevent_env [ 324.698044] kobject: 'batman_adv' (000000008e639743): kobject_uevent_env: filter function caused the event to drop! [ 324.708658] kobject: 'batman_adv' (000000008e639743): kobject_cleanup, parent (null) [ 324.717402] kobject: 'batman_adv' (000000008e639743): calling ktype release [ 324.724766] kobject: (000000008e639743): dynamic_kobj_release [ 324.730755] kobject: 'batman_adv': free name [ 324.735272] kobject: 'rx-0' (000000003d58e1d6): kobject_cleanup, parent 000000000e6289f6 [ 324.743563] kobject: 'rx-0' (000000003d58e1d6): auto cleanup 'remove' event [ 324.750693] kobject: 'rx-0' (000000003d58e1d6): kobject_uevent_env [ 324.756991] kobject: 'rx-0' (000000003d58e1d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 324.767048] kobject: 'rx-0' (000000003d58e1d6): auto cleanup kobject_del [ 324.773918] kobject: 'rx-0' (000000003d58e1d6): calling ktype release [ 324.780523] kobject: 'rx-0': free name [ 324.784427] kobject: 'tx-0' (00000000bd824e91): kobject_cleanup, parent 000000000e6289f6 [ 324.792668] kobject: 'tx-0' (00000000bd824e91): auto cleanup 'remove' event [ 324.799803] kobject: 'tx-0' (00000000bd824e91): kobject_uevent_env [ 324.806125] kobject: 'tx-0' (00000000bd824e91): kobject_uevent_env: uevent_suppress caused the event to drop! [ 324.816188] kobject: 'tx-0' (00000000bd824e91): auto cleanup kobject_del [ 324.823065] kobject: 'tx-0' (00000000bd824e91): calling ktype release [ 324.829657] kobject: 'tx-0': free name [ 324.833546] kobject: 'queues' (000000000e6289f6): kobject_cleanup, parent (null) [ 324.841956] kobject: 'queues' (000000000e6289f6): calling ktype release [ 324.849084] kobject: 'queues' (000000000e6289f6): kset_release [ 324.855049] kobject: 'queues': free name [ 324.859458] kobject: 'ip6gretap0' (00000000278fff1c): kobject_uevent_env [ 324.866292] kobject: 'ip6gretap0' (00000000278fff1c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 324.918619] kobject: 'ip6gre0' (000000003bbd776f): kobject_cleanup, parent (null) [ 324.927129] kobject: 'ip6gre0' (000000003bbd776f): auto cleanup 'remove' event [ 324.934551] kobject: 'ip6gre0' (000000003bbd776f): kobject_uevent_env [ 324.941139] kobject: 'ip6gre0' (000000003bbd776f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 324.951484] kobject: 'ip6gre0' (000000003bbd776f): calling ktype release [ 324.958356] kobject: 'ip6gre0': free name [ 324.962594] kobject: 'ip6gretap0' (00000000278fff1c): kobject_cleanup, parent (null) [ 324.971363] kobject: 'ip6gretap0' (00000000278fff1c): auto cleanup 'remove' event [ 324.979029] kobject: 'ip6gretap0' (00000000278fff1c): kobject_uevent_env [ 324.985860] kobject: 'ip6gretap0' (00000000278fff1c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 324.996452] kobject: 'ip6gretap0' (00000000278fff1c): calling ktype release [ 325.003584] kobject: 'ip6gretap0': free name [ 325.072461] kobject: 'rx-0' (0000000083513822): kobject_cleanup, parent 00000000edc7b03b [ 325.083182] kobject: 'rx-0' (0000000083513822): auto cleanup 'remove' event [ 325.090598] kobject: 'rx-0' (0000000083513822): kobject_uevent_env [ 325.091945] IPVS: ftp: loaded support on port[0] = 21 [ 325.096926] kobject: 'rx-0' (0000000083513822): kobject_uevent_env: uevent_suppress caused the event to drop! [ 325.112898] kobject: 'rx-0' (0000000083513822): auto cleanup kobject_del [ 325.119958] kobject: 'rx-0' (0000000083513822): calling ktype release [ 325.126524] kobject: 'rx-0': free name [ 325.130464] kobject: 'tx-0' (00000000597bf370): kobject_cleanup, parent 00000000edc7b03b [ 325.138713] kobject: 'tx-0' (00000000597bf370): auto cleanup 'remove' event [ 325.145800] kobject: 'tx-0' (00000000597bf370): kobject_uevent_env [ 325.152133] kobject: 'tx-0' (00000000597bf370): kobject_uevent_env: uevent_suppress caused the event to drop! [ 325.162210] kobject: 'tx-0' (00000000597bf370): auto cleanup kobject_del [ 325.169102] kobject: 'tx-0' (00000000597bf370): calling ktype release [ 325.175679] kobject: 'tx-0': free name [ 325.179597] kobject: 'queues' (00000000edc7b03b): kobject_cleanup, parent (null) [ 325.188009] kobject: 'queues' (00000000edc7b03b): calling ktype release [ 325.194785] kobject: 'queues' (00000000edc7b03b): kset_release [ 325.200802] kobject: 'queues': free name [ 325.205048] kobject: 'ip6tnl0' (00000000683984c0): kobject_uevent_env [ 325.211658] kobject: 'ip6tnl0' (00000000683984c0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 325.222172] kobject: 'lo' (000000003d85db36): kobject_add_internal: parent: 'net', set: 'devices' [ 325.231998] kobject: 'lo' (000000003d85db36): kobject_uevent_env [ 325.238157] kobject: 'lo' (000000003d85db36): fill_kobj_path: path = '/devices/virtual/net/lo' [ 325.247003] kobject: 'queues' (00000000c2305db8): kobject_add_internal: parent: 'lo', set: '' [ 325.256235] kobject: 'queues' (00000000c2305db8): kobject_uevent_env [ 325.262744] kobject: 'queues' (00000000c2305db8): kobject_uevent_env: filter function caused the event to drop! [ 325.272998] kobject: 'rx-0' (00000000471af0ea): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.282422] kobject: 'rx-0' (00000000471af0ea): kobject_uevent_env [ 325.288805] kobject: 'rx-0' (00000000471af0ea): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 325.298875] kobject: 'tx-0' (00000000a203d01c): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.308322] kobject: 'tx-0' (00000000a203d01c): kobject_uevent_env [ 325.314683] kobject: 'tx-0' (00000000a203d01c): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 325.325207] kobject: 'ip6tnl0' (00000000683984c0): kobject_cleanup, parent (null) [ 325.325360] kobject: 'tunl0' (00000000e6adc532): kobject_add_internal: parent: 'net', set: 'devices' [ 325.336164] kobject: 'ip6tnl0' (00000000683984c0): auto cleanup 'remove' event [ 325.343787] kobject: 'tunl0' (00000000e6adc532): kobject_uevent_env [ 325.352828] kobject: 'ip6tnl0' (00000000683984c0): kobject_uevent_env [ 325.356827] kobject: 'tunl0' (00000000e6adc532): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 325.363653] kobject: 'ip6tnl0' (00000000683984c0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 325.373277] kobject: 'queues' (00000000fce381c2): kobject_add_internal: parent: 'tunl0', set: '' [ 325.386456] kobject: 'ip6tnl0' (00000000683984c0): calling ktype release [ 325.393055] kobject: 'queues' (00000000fce381c2): kobject_uevent_env [ 325.402290] kobject: 'ip6tnl0': free name [ 325.406366] kobject: 'queues' (00000000fce381c2): kobject_uevent_env: filter function caused the event to drop! [ 325.420763] kobject: 'rx-0' (00000000177fb312): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.430186] kobject: 'rx-0' (00000000177fb312): kobject_uevent_env [ 325.436515] kobject: 'rx-0' (00000000177fb312): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 325.446835] kobject: 'tx-0' (000000003ad60505): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.456705] kobject: 'tx-0' (000000003ad60505): kobject_uevent_env [ 325.463073] kobject: 'tx-0' (000000003ad60505): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 325.473839] kobject: 'gre0' (00000000eed5dd7d): kobject_add_internal: parent: 'net', set: 'devices' [ 325.483862] kobject: 'gre0' (00000000eed5dd7d): kobject_uevent_env [ 325.490230] kobject: 'gre0' (00000000eed5dd7d): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 325.499437] kobject: 'queues' (000000002ce32775): kobject_add_internal: parent: 'gre0', set: '' [ 325.508839] kobject: 'queues' (000000002ce32775): kobject_uevent_env [ 325.515326] kobject: 'queues' (000000002ce32775): kobject_uevent_env: filter function caused the event to drop! [ 325.525592] kobject: 'rx-0' (00000000d70516d3): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.535063] kobject: 'rx-0' (00000000d70516d3): kobject_uevent_env [ 325.541474] kobject: 'rx-0' (00000000d70516d3): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 325.551708] kobject: 'tx-0' (00000000dfa78aa4): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.561237] kobject: 'tx-0' (00000000dfa78aa4): kobject_uevent_env [ 325.567583] kobject: 'tx-0' (00000000dfa78aa4): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 325.622820] kobject: 'rx-0' (00000000122144b0): kobject_cleanup, parent 0000000070878559 [ 325.631081] kobject: 'rx-0' (00000000122144b0): auto cleanup 'remove' event [ 325.638174] kobject: 'rx-0' (00000000122144b0): kobject_uevent_env [ 325.644549] kobject: 'rx-0' (00000000122144b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 325.654613] kobject: 'rx-0' (00000000122144b0): auto cleanup kobject_del [ 325.661484] kobject: 'rx-0' (00000000122144b0): calling ktype release [ 325.668055] kobject: 'rx-0': free name [ 325.671981] kobject: 'tx-0' (00000000d53b9310): kobject_cleanup, parent 0000000070878559 [ 325.680229] kobject: 'tx-0' (00000000d53b9310): auto cleanup 'remove' event [ 325.687329] kobject: 'tx-0' (00000000d53b9310): kobject_uevent_env [ 325.693658] kobject: 'tx-0' (00000000d53b9310): kobject_uevent_env: uevent_suppress caused the event to drop! [ 325.703745] kobject: 'tx-0' (00000000d53b9310): auto cleanup kobject_del [ 325.710618] kobject: 'tx-0' (00000000d53b9310): calling ktype release [ 325.717186] kobject: 'tx-0': free name [ 325.721094] kobject: 'queues' (0000000070878559): kobject_cleanup, parent (null) [ 325.729507] kobject: 'queues' (0000000070878559): calling ktype release [ 325.736234] kobject: 'queues' (0000000070878559): kset_release [ 325.742210] kobject: 'queues': free name [ 325.746443] kobject: 'sit0' (00000000e7b1f931): kobject_uevent_env [ 325.752774] kobject: 'sit0' (00000000e7b1f931): kobject_uevent_env: uevent_suppress caused the event to drop! [ 325.763153] kobject: 'gretap0' (00000000c19c3418): kobject_add_internal: parent: 'net', set: 'devices' [ 325.773923] kobject: 'gretap0' (00000000c19c3418): kobject_uevent_env [ 325.780590] kobject: 'gretap0' (00000000c19c3418): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 325.790287] kobject: 'queues' (000000009e8983f8): kobject_add_internal: parent: 'gretap0', set: '' [ 325.799944] kobject: 'queues' (000000009e8983f8): kobject_uevent_env [ 325.806430] kobject: 'queues' (000000009e8983f8): kobject_uevent_env: filter function caused the event to drop! [ 325.816687] kobject: 'rx-0' (00000000064f10ce): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.826120] kobject: 'rx-0' (00000000064f10ce): kobject_uevent_env [ 325.832501] kobject: 'rx-0' (00000000064f10ce): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 325.842954] kobject: 'tx-0' (00000000e1c7a10c): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.852553] kobject: 'tx-0' (00000000e1c7a10c): kobject_uevent_env [ 325.858941] kobject: 'tx-0' (00000000e1c7a10c): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 325.870032] kobject: 'batman_adv' (0000000095b8331a): kobject_add_internal: parent: 'gretap0', set: '' [ 325.880477] kobject: 'erspan0' (000000001f618702): kobject_add_internal: parent: 'net', set: 'devices' [ 325.890361] kobject: 'erspan0' (000000001f618702): kobject_uevent_env [ 325.896986] kobject: 'erspan0' (000000001f618702): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 325.906692] kobject: 'queues' (0000000037dbf538): kobject_add_internal: parent: 'erspan0', set: '' [ 325.916354] kobject: 'queues' (0000000037dbf538): kobject_uevent_env [ 325.922867] kobject: 'queues' (0000000037dbf538): kobject_uevent_env: filter function caused the event to drop! [ 325.933126] kobject: 'rx-0' (00000000727c7aa6): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.942543] kobject: 'rx-0' (00000000727c7aa6): kobject_uevent_env [ 325.948891] kobject: 'rx-0' (00000000727c7aa6): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 325.959396] kobject: 'tx-0' (00000000322843d5): kobject_add_internal: parent: 'queues', set: 'queues' [ 325.968858] kobject: 'tx-0' (00000000322843d5): kobject_uevent_env [ 325.975176] kobject: 'tx-0' (00000000322843d5): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 325.986109] kobject: 'batman_adv' (00000000b5227f7a): kobject_add_internal: parent: 'erspan0', set: '' [ 325.996470] kobject: 'ip_vti0' (000000001808f2f8): kobject_add_internal: parent: 'net', set: 'devices' [ 326.006711] kobject: 'ip_vti0' (000000001808f2f8): kobject_uevent_env [ 326.013336] kobject: 'ip_vti0' (000000001808f2f8): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 326.023053] kobject: 'queues' (00000000bb019dc2): kobject_add_internal: parent: 'ip_vti0', set: '' [ 326.032711] kobject: 'queues' (00000000bb019dc2): kobject_uevent_env [ 326.039240] kobject: 'queues' (00000000bb019dc2): kobject_uevent_env: filter function caused the event to drop! [ 326.049502] kobject: 'rx-0' (00000000a24bdacf): kobject_add_internal: parent: 'queues', set: 'queues' [ 326.058932] kobject: 'rx-0' (00000000a24bdacf): kobject_uevent_env [ 326.065276] kobject: 'rx-0' (00000000a24bdacf): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 326.075771] kobject: 'tx-0' (000000006dd70210): kobject_add_internal: parent: 'queues', set: 'queues' [ 326.085314] kobject: 'tx-0' (000000006dd70210): kobject_uevent_env [ 326.091682] kobject: 'tx-0' (000000006dd70210): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 326.102607] kobject: 'sit0' (00000000e7b1f931): kobject_cleanup, parent (null) [ 326.102829] kobject: 'ip6_vti0' (000000003d12fa6f): kobject_add_internal: parent: 'net', set: 'devices' [ 326.111074] kobject: 'sit0' (00000000e7b1f931): auto cleanup 'remove' event [ 326.121209] kobject: 'ip6_vti0' (000000003d12fa6f): kobject_uevent_env [ 326.129943] kobject: 'sit0' (00000000e7b1f931): kobject_uevent_env [ 326.134315] kobject: 'ip6_vti0' (000000003d12fa6f): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 326.141544] kobject: 'sit0' (00000000e7b1f931): kobject_uevent_env: uevent_suppress caused the event to drop! [ 326.150548] kobject: 'queues' (000000006893e460): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 326.163261] kobject: 'sit0' (00000000e7b1f931): calling ktype release [ 326.170369] kobject: 'queues' (000000006893e460): kobject_uevent_env [ 326.176944] kobject: 'sit0': free name [ 326.183367] kobject: 'queues' (000000006893e460): kobject_uevent_env: filter function caused the event to drop! [ 326.183399] kobject: 'rx-0' (0000000035359886): kobject_add_internal: parent: 'queues', set: 'queues' [ 326.206893] kobject: 'rx-0' (0000000035359886): kobject_uevent_env [ 326.213249] kobject: 'rx-0' (0000000035359886): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 326