gram 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:33 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f2}, 0x28) 17:01:33 executing program 4: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:33 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x17bbb) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x8) 17:01:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4801, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:33 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f3}, 0x28) 17:01:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4c00, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:33 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xbde) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x503, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:33 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) r1 = getpid() r2 = creat(&(0x7f0000000080)='./file0\x00', 0xc1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x65, 0x0, 0x1, r2, 0x14c}, 0x2c) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000bd) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r3, 0x2) ioctl$TIOCNOTTY(r3, 0x5422) dup3(r4, r3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) getpid() write(r3, &(0x7f0000c34fff), 0xffffff0b) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x28080, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4f00, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:33 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f4}, 0x28) 17:01:33 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r2, 0x0, 0x10000000000443) 17:01:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f5}, 0x28) 17:01:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x5200, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:34 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r2, 0x0, 0x10000000000443) 17:01:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:34 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r2, 0x0, 0x10000000000443) 17:01:34 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe7f0012006b0000"], 0x8) 17:01:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f6}, 0x28) 17:01:34 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xda95, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x400) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000180)=0x3) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) bind$netrom(r5, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000040)={0x2, 0xffffffffffffff9c}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6203, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f7}, 0x28) 17:01:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="fe6d656d4fb8f06f726c7f"], 0x8) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 17:01:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f8}, 0x28) 17:01:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6402, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6800, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f9}, 0x28) 17:01:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) rt_sigprocmask(0x0, &(0x7f0000000100)={0xffffffffffff4cae}, &(0x7f0000000140), 0x8) fcntl$lock(r2, 0x27, &(0x7f0000000040)={0x0, 0x1, 0x8, 0x40, r3}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x80000) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f0000000300)={0xd, @win={{0x7ff, 0x9d56, 0x2, 0x401}, 0x7, 0x94b9, &(0x7f0000000280)={{0x9, 0x4, 0x4, 0x6}, &(0x7f0000000240)={{0x5e8f, 0x44b, 0x5, 0x6}, &(0x7f0000000180)={{0x7f, 0xca, 0x4b96, 0x7fffffff}}}}, 0x9, &(0x7f00000002c0)="a6b156989763a95c7da964a22e6c579babb029bb53b882"}}) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000000c0)={0x0, @speck128}) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RATTACH(r0, &(0x7f00000001c0)={0x179, 0x69, 0xfffffffffffffffe, {0x180, 0x0, 0x6}}, 0x14) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000040)={0x5, 0x4, 0x8}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) 17:01:34 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r2 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYRES64=r1], 0x8) 17:01:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14fa}, 0x28) 17:01:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14fb}, 0x28) 17:01:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xeb/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x3ff, 0x289, 0x4, 0x7, 0x0, 0x4, 0x21, 0xeba6de67fe02f52f, 0x3, 0x2, 0x1, 0x3, 0xff, 0x5, 0x100000000, 0x7f, 0x5, 0xffffffffffff67ce, 0xc30, 0x100, 0x2, 0x7fff, 0x7c1, 0x9, 0x2, 0x640000, 0x1, 0x2, 0x2, 0x9, 0x6, 0x0, 0x800, 0x5, 0x5, 0x2, 0x0, 0x100000001, 0x4, @perf_config_ext={0x2}, 0x1000, 0x51f, 0x40, 0x7, 0xffffffffffff0000, 0x81, 0x2}, r4, 0x7, r1, 0x9) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) accept4$llc(r0, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x40) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000380)='timers\x00') r3 = openat$cgroup_ro(r2, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0xffffffffffffff00, 0x88, 0x20, 0x604}) 17:01:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000180)=r1) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) ftruncate(r0, 0x7f) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14fe}, 0x28) 17:01:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x7a00, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1e741) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000000)=""/175, &(0x7f00000000c0)=0xaf) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14ff}, 0x28) 17:01:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8002, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040)=0x2, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x8001}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x9c, "1ed15990aa2d2961a41383d63a7b506a8ed92679c6639c4431e6066d7a56bdd41010eb93f27822baef50a4c9bed1d81a8a3c11e47f73a11f651cdb63bbf0a1835be74653aa2fc7abd404525eaf933cb4d08ffcd02925ce7a4ab11393535338f531064527be4987f9f837925ed8d5dc9df402111839f5139ed7b515eca3b0f9f41d7f538bd0d80149e49cb352728fc207c1c3ac5d8073cb0791f4bfcd"}, &(0x7f00000001c0)=0xa4) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={r1, 0x3, 0x9, 0x5e1d0cbc, 0x51, 0x0, 0x101, 0x8, {r2, @in6={{0xa, 0x0, 0x2, @local, 0xdf97}}, 0x0, 0x4, 0x80000001, 0xfd, 0x1ff}}, &(0x7f00000002c0)=0xb0) 17:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8003, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1500}, 0x28) 17:01:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000440)={"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"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) recvfrom$rose(r0, &(0x7f0000000000)=""/79, 0x4f, 0x10041, &(0x7f0000000080)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x28, "df08f30e2a426c09c2a87c493ebbea4cc5c9701c35ce7a82c8e1f7f6cf643f36dea7c0acb74274f2"}, &(0x7f0000000340)=0x30) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) ioctl$SIOCRSSCAUSE(r3, 0x89e1, &(0x7f0000000840)=0xc0a) write$cgroup_subtree(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="fe6d656d6f72797f803fe33c56fec41479b14a829465f10dd45f141841e49bd86a55c368b3ae8d7873bcc67033fcccf527ad91f39f6f1734efc15d7cf3e3f00ad7ca6aaa99ab7e2db774e37148258f5e4e39b3bad0a97e4ba53734526007f72ed216c7f55a7a0c54c8568252118e7bfcd955a9e52e0ad6dfd26bd535049c3548aaa14c1c70d28310db7e9666837bb347ff27d5c779feb614c28d1a811e0c48693eeb95b8db21"], 0x8) 17:01:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3df, 0x2) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000040)={0x100, 0x7, 0x81, 0xdf, 0xb2, 0x7ff}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8600, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1501}, 0x28) 17:01:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x4, 0x24012, r0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000680)={0x4}) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000005c0)=[@in6={0xa, 0x4e22, 0x0, @remote, 0x6}, @in6={0xa, 0x4e22, 0xffffffffffff0001, @ipv4={[], [], @remote}}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x757}], 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000a80400000000000000010000000000006002000060020000d8030000d8030000d8030000d8030100d803000500000000", @ANYPTR=&(0x7f0000000700)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80000010000000000000000000000000000000000000000000000003800534554000000000000000000000000000000000000000000000000000003450a000100000204ff03020200100000090000000000000000000000000000000000000000000001ff020000000000000000000000000001ffffffffffffff00ffffffffff000000000000ffffffffff00000000ffffff0073797a6b616c6c65723100000000000065716c00000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000604430000000000000000000000000000001801600100000000000000000000000000000000000000000000000028006575693634000000000000000000000000000000000000000000000000000000000000000000280069636d7036000000000000000000000000000000000000000000000000000b06090000000000480049444c4554494d45520000000000000000000000000000000000000000000300000073797a31000000000000000000000000000000000000000000fcfffffffffffffffe8000000000000000000000000000aaff020000000000000000000000000001ffffffffffffff000000000000000000ff000000ffffffff000000ff000000ff6772657461703000000000000000000074756e6c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000007f00fe002000000000000000000000000000000038017801000000000000000000000000000000000000000000000000280065636e0000000000000000000000000000000000000000000000000000002120ed070000000048006862680000000000000000000000000000000000000000000000000000000300000006010700d6077a09eb057f000400010000000100cf060000ffffff03060081000700070040004552524f5200000000000000000000000000000000000000000000000000e5c3a3487c70988095e48b43f6234505f7b6dde35cd484dfa2906ea5211c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000000000"], 0x508) 17:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8c00, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa601, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:36 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sync_file_range(r0, 0x3, 0x2, 0x36cb97306160e826) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f00000023c0)={@loopback, 0x0}, &(0x7f0000002400)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000002440)={@empty, r3}, 0x14) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x334) fadvise64(r0, 0x0, 0xfffffffffffffffe, 0x4) 17:01:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1502}, 0x28) 17:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = semget(0x3, 0x1, 0x50) semctl$GETNCNT(r3, 0x4, 0xe, &(0x7f0000000200)=""/193) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa800, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000140)={r0, r0, 0x6b, 0xd6, &(0x7f0000000040)="1da523410676e0d2cbab718167143693b40d8e73df52c277224a304c0eb1f22f28cc8e800a42a82605fb96fc1bf23c38238bcbf445dc9a5f3b60626b1128f9ed765d4e21c367bf61fcb2f45b340f8bb5fc7d6dd4ed45a0be69b7c252ac5bd21c07be744c942a84a3351ff4d9ef39d4171e22fcddb6a831cb80305db78154f48f99c94ddb38362df4380db0bdb3dcc4ef2baeb68dd4c7405fd280c082d7e871fd464d4b361e5572d4dddbab442b34a54c2922cf27d38489b941aad0b533007246dbae5d440bda1c2a23f314a8ac166d7bb7ce6ba11387", 0x28ed, 0x3, 0x48f, 0x955, 0x80000001, 0x1, 0x1, 'syz0\x00'}) 17:01:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1503}, 0x28) 17:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fsetxattr$security_ima(r2, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "cff1e7338ea0eadc68813e793bcef71b6d39ea17"}, 0x15, 0x2) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="f86d656d6f72797f3199e61018510d7d5be0a3a13b85d2d59d235ff697bd359111abaaeca916a6d292648d62f5b8f148bd142a3ea8"], 0x8) 17:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa801, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1504}, 0x28) 17:01:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480), 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:37 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000100)) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) r1 = getgid() r2 = getgid() getgroups(0x7, &(0x7f00000001c0)=[0x0, 0xee01, 0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) setresgid(r1, r2, r3) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f00000000c0)={r4, 0x2}) 17:01:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xae02, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1505}, 0x28) 17:01:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480), 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x4, &(0x7f0000000080)={0x4}, 0x8) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xb002, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:37 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x40000000003, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) mremap(&(0x7f0000010000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000000c000/0x3000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1506}, 0x28) 17:01:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xba03, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1507}, 0x28) 17:01:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480), 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc001, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:37 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) migrate_pages(r1, 0x9, &(0x7f0000000080)=0xff24, &(0x7f00000000c0)=0x95) restart_syscall() 17:01:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x184, 0x32, 0xc20, 0x70bd29, 0x25dfdbff, {0x17}, [@generic="a414aa5eaf29970b91270e6e2ff201f8737225c97ceb97698e3b3e3ae4b7211390c61b67b6ba0c0688d3f83ab0589f413537704ce2ab05cbdbcaa34873bc57eecf881b3922a7cd0957b18989d0465cb1a708f994fb34f27e3cb2f7c65c7b99b7ae11faf3e5706c3947e4eaf2b8a7eba3560422df41967f7e0e", @typed={0x8, 0x43, @ipv4=@broadcast}, @nested={0xec, 0x74, [@generic="04d8f3520348076116167ba2ec1e2e7a613537be2cd475140fd3b85853ffed536126062846b8992b0cb897a3ea2906d98f94f6de9b54e25a8c7f14aae92ccabc26faa36a1a6cb74b53c7d02d7e058ea5963c2390ba210a80c90ef5a5a890d61835628084d3f8fdafe2770039ae6315a4f785e9223fc08fdee80d776091258456511ba2120d8619268ee5be619e4379f276660bcd85934ea84962ab4dac1a9ba174396feeff2207dcd4b369923bd39cb01fefc7f9c3880891bceb930a74ecaed2bd04480437104686d2410c7294c90e7af491013b5aeb6351ccfd03694254ebefa47f8f6f8daa06"]}]}, 0x184}, 0x1, 0x0, 0x0, 0x4044}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1f6e7f0000000000"], 0x8) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x8000) 17:01:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000000)={0xa, [0xfffffffffffffffa, 0x7fffffff, 0x3, 0x6, 0x0, 0x9, 0x9, 0x3, 0x1, 0x100000001]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5", 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1508}, 0x28) 17:01:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc400, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:37 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x2, {0x8}}, 0x18) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:37 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x960) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="036d656d6f7279ff84b03d3d164d1217cbc8dfb767e0a2276a5b5812b7a85b97824e05911cba6aa6036325a993a886426e35091896865227908eeb44e0be98ca737dcc1ae8f80893d053d40de10786900deafeed7f96f170008fb8d456cde418df8d"], 0x8) 17:01:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc403, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1509}, 0x28) 17:01:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5", 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xd402, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:38 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x200001, 0x40) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) pwrite64(r0, &(0x7f0000000040)="d17c18173faa0dbe6d84bc662e88e918567d16c62dfd0fa215c60e6e7f3d5a93b571566778ce4d66d4549bad15d85e0cfe114404b8a52f80482fb55821f45c8da4baf9fd6adcf8bb7c7a0a9a51ad8c7f95af26e9ec8972a7528787e7d6001a25ea9bbe01f51d470d1079d3d1e705a3b8a4f184373f432deadea2f33d8c39c367cbfed5655ca5c6382364dcfff26f42b5f1d599a153d83bcb0c6d60a7b2b0e5cfbc971dec3a606018cab541db26e43a2078ebddde18b469b26b1d59a1e5fc64ddcd3f13e6e02a19836aefe3", 0xcb, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x2, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0000c06551b519000000000000"], 0x8) 17:01:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1cc, 0x0, 0x0, 0x0) 17:01:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x150a}, 0x28) 17:01:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xd503, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5", 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:38 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000015000/0x1000)=nil, 0x1000}, 0x1}) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0x81, 0x20}, {0x3, 0x6}, 0x0, 0x1, 0x9}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100)=0x9, 0x4) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="a4"], 0x8) 17:01:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe402, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x150b}, 0x28) 17:01:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9", 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:38 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:38 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x40024012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x150c}, 0x28) 17:01:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe403, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9", 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x7ff}}, 0x9, 0x20000000200000, 0x8, 0xc0, 0x10}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1ff, 0x10000, 0x3ff, 0x7fff, 0x3}, &(0x7f0000000140)=0x98) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000000)=r0, 0x4) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x150d}, 0x28) 17:01:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9", 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe503, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:39 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={{0x0, 0x240, 0x7fff, 0xaad6, 0x81, 0x5}, 0x7ff, 0x29, 0x7}) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x150e}, 0x28) 17:01:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:39 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d65ed6f72797f"], 0x8) 17:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe801, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x150f}, 0x28) 17:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xec00, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:39 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x40000) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$setsig(0x4203, r1, 0x1ff, &(0x7f0000000040)={0x32, 0x401, 0x8}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xedc0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1510}, 0x28) 17:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xee01, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000080)={'yam0\x00', 0x81}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r3, 0x1, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0, 0x0, 0x0, 0x32b}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="00fcffffff"], 0x8) 17:01:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7000000000, 0x10000) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:40 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1511}, 0x28) 17:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf400, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:40 executing program 4: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:01:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:40 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656e6f72797f"], 0x8) 17:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf602, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:40 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1512}, 0x28) 17:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfa03, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000080)={0x20, 0xfffffffffffffff5, 0x8, {0x8, 0x0, 0x38338261, 0x3}}, 0x20) 17:01:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:40 executing program 5: pipe(&(0x7f0000000500)={0xffffffffffffffff}) r1 = syz_open_dev$vbi(&(0x7f0000000540)='/dev/vbi#\x00', 0x0, 0x2) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000580)=r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x111001, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) clock_gettime(0x0, &(0x7f0000007980)={0x0, 0x0}) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x13}, 0x2}}, 0xa4f6, 0x6, 0x101, 0x4, 0x7}, &(0x7f0000000200)=0x98) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r3, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x108808}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x78, r9, 0x630, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x4000800) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f0000000340)={r8, 0x5, 0x776}, 0x8) recvmmsg(0xffffffffffffff9c, &(0x7f00000077c0)=[{{&(0x7f0000004740)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000004980)=[{&(0x7f00000047c0)=""/105, 0x69}, {&(0x7f0000004840)=""/137, 0x89}, {&(0x7f0000004900)=""/88, 0x58}], 0x3, &(0x7f00000049c0)=""/68, 0x44}, 0x1}, {{&(0x7f0000004a40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000005000)=[{&(0x7f0000004ac0)=""/252, 0xfc}, {&(0x7f0000004bc0)=""/251, 0xfb}, {&(0x7f0000004cc0)=""/145, 0x91}, {&(0x7f0000004d80)=""/3, 0x3}, {&(0x7f0000004dc0)=""/134, 0x86}, {&(0x7f0000004e80)=""/106, 0x6a}, {&(0x7f0000004f00)=""/119, 0x77}, {&(0x7f0000004f80)=""/126, 0x7e}], 0x8, &(0x7f0000005080)=""/148, 0x94}, 0x5}, {{&(0x7f0000005140)=@nfc, 0x80, &(0x7f00000054c0)=[{&(0x7f00000051c0)=""/215, 0xd7}, {&(0x7f00000052c0)=""/2, 0x2}, {&(0x7f0000005300)=""/186, 0xba}, {&(0x7f00000053c0)=""/197, 0xc5}], 0x4, &(0x7f0000005500)=""/35, 0x23}, 0x8}, {{&(0x7f0000005540)=@generic, 0x80, &(0x7f00000068c0)=[{&(0x7f00000055c0)=""/117, 0x75}, {&(0x7f0000005640)=""/117, 0x75}, {&(0x7f00000056c0)=""/59, 0x3b}, {&(0x7f0000005700)=""/156, 0x9c}, {&(0x7f00000057c0)=""/63, 0x3f}, {&(0x7f0000005800)=""/175, 0xaf}, {&(0x7f00000058c0)=""/4096, 0x1000}], 0x7, &(0x7f0000006940)=""/206, 0xce}}, {{&(0x7f0000006a40)=@nl, 0x80, &(0x7f0000006d40)=[{&(0x7f0000006ac0)=""/25, 0x19}, {&(0x7f0000006b00)=""/45, 0x2d}, {&(0x7f0000006b40)=""/133, 0x85}, {&(0x7f0000006c00)=""/20, 0x14}, {&(0x7f0000006c40)=""/181, 0xb5}, {&(0x7f0000006d00)=""/37, 0x25}], 0x6, &(0x7f0000006dc0)=""/119, 0x77}, 0x1}, {{&(0x7f0000006e40)=@xdp, 0x80, &(0x7f0000007100)=[{&(0x7f0000006ec0)=""/176, 0xb0}, {&(0x7f0000006f80)=""/164, 0xa4}, {&(0x7f0000007040)=""/184, 0xb8}], 0x3, &(0x7f0000007140)=""/127, 0x7f}, 0x400}, {{&(0x7f00000071c0)=@can, 0x80, &(0x7f0000007680)=[{&(0x7f0000007240)=""/216, 0xd8}, {&(0x7f0000007340)=""/231, 0xe7}, {&(0x7f0000007440)=""/74, 0x4a}, {&(0x7f00000074c0)=""/183, 0xb7}, {&(0x7f0000007580)=""/219, 0xdb}], 0x5, &(0x7f0000007700)=""/132, 0x84}, 0x6}], 0x7, 0x10020, &(0x7f00000079c0)={r5, r6+10000000}) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000007a00)='yeah\x00', 0x5) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000240)={r8, 0xfffffffffffffff9}, 0x8) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T4(r10, 0x103, 0x6, &(0x7f0000000140)=0x5, 0x4) ioctl$TIOCSETD(r11, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r11, r4, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r4}) getsockopt$XDP_STATISTICS(r12, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0xfffffffffffffdb3) 17:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfb03, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:40 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40000000000002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0xa, 0x0, 0x11) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 17:01:40 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1513}, 0x28) 17:01:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:40 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/88, 0x58) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x8) 17:01:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfc00, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:40 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1514}, 0x28) 17:01:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfc02, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:40 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xd24, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x40000000000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0xfffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d6d6d6f72797f"], 0x8) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000000)=0x1) 17:01:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4500, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc004000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x1a4, r4, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6e}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xcc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfb}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3750000000000000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc079}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbaf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x50}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaf1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5135}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1515}, 0x28) 17:01:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, 0x0, &(0x7f0000000100)) 17:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xff0f, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x800) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1516}, 0x28) 17:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x20000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:41 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x40100, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000e00)=ANY=[@ANYBLOB], 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000001a80)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) getdents(r3, 0x0, 0xffffffffffffffec) r4 = socket$inet6(0xa, 0x803, 0x3) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f00000001c0)=0xfffffffffffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) mq_getsetattr(r2, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) sendto$inet(r5, &(0x7f0000000780)="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", 0xfca, 0x40800, 0x0, 0x0) dup3(r5, r4, 0x0) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 17:01:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1517}, 0x28) 17:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x30000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x80000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe80656d6f72797f"], 0x8) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:01:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1518}, 0x28) 17:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x40000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:41 executing program 4: r0 = timerfd_create(0x0, 0x80800) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) read(r0, &(0x7f0000000140)=""/137, 0x89) 17:01:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xf64a, 0x40000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe0000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1519}, 0x28) 17:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x989680, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:41 executing program 4: 17:01:41 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000000c0)={0x9c, r1, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x9c}}, 0x40000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:41 executing program 4: 17:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x151a}, 0x28) 17:01:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TCSBRKP(r3, 0x5425, 0x7) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:42 executing program 4: 17:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0x4}) 17:01:42 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x151b}, 0x28) 17:01:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x40, 0x7b8b, 0x3, {r1, r2+10000000}, 0x8000, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000000)={0x1, 0xadde, 0x4, 0x6, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) 17:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:42 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x151c}, 0x28) 17:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b0") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:42 executing program 4: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaabbaaaaaaaaaaaa060085967e57ca63cf0378e051c47e7fc675412e1213c3944e076aec8a84ac2b47054058b9270be8d002e8e845629aa3ecd13b312ba50e5e4e72e2c9ab2e715dce53baa7c50129af2040e686033c1e36eb4343e38e667065403aedee63d1952c0d84940862beccfb8bb63f28e84868d4bc020e37a6284917e4d1fa2fedfc8df2a92c824bc6558e3cb36241a6116781ae744af93011436017190b35bd519c44a79bb1cf6c49e43e46ad88afc634e3e76c04000000000067af00000000000000000000000000007c21e0"], 0x0) 17:01:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000002780)={0x9, &(0x7f0000000040)=""/55, &(0x7f0000002680)=[{0x200, 0x98, 0x7bde, &(0x7f0000000080)=""/152}, {0x101, 0xaf, 0x0, &(0x7f0000000400)=""/175}, {0x4e, 0xe6, 0x4, &(0x7f00000004c0)=""/230}, {0x65b323c7, 0x24, 0x800, &(0x7f0000000140)=""/36}, {0x4, 0x1000, 0x40000, &(0x7f00000005c0)=""/4096}, {0x5, 0x14, 0x7fffffff, &(0x7f0000000300)=""/20}, {0x8, 0x1000, 0x148180000, &(0x7f00000015c0)=""/4096}, {0xb7be, 0x91, 0x3, &(0x7f00000025c0)=""/145}, {0x3, 0x31, 0x6, &(0x7f0000000340)=""/49}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = msgget(0x3, 0x40) msgctl$MSG_STAT(r1, 0xb, &(0x7f00000027c0)=""/49) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000002800)=r2, 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xffff}, 0x4) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b0") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:42 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x151d}, 0x28) 17:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:42 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x151e}, 0x28) 17:01:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b0") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/icmp6\x00') openat$ppp(0xffffffffffffff9c, 0x0, 0x2000203a, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, 0x0, 0xcf) recvfrom$inet(r0, &(0x7f00000004c0)=""/39, 0xffffff8d, 0x10020, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2779}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={@remote, @dev, @empty, 0x0, 0x40, 0x0, 0x100, 0x2, 0x40000003}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 17:01:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendto$packet(r1, &(0x7f0000000000)="cdfb98468bcc8642c821e550d6ef41b9588582113833cc8b2c4530c7fc8bb659bb4bfb4d09293cbb532343e57b418fb7e7f091441431f679e7ffeed05ffba67e3cb7e0c3da4e5dde002132f98677bd1673", 0x51, 0x1, &(0x7f0000000100)={0x11, 0x17, r3, 0x1, 0x7, 0x6, @random="d039649eb6b1"}, 0x14) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sync_file_range(r0, 0x6, 0x20, 0x1) 17:01:43 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x151f}, 0x28) 17:01:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, 0x0) sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:43 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1520}, 0x28) 17:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x9000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, 0x0) sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000000)={[{0x7fffffff, 0x9, 0x3, 0x7ea, 0xffffffff, 0x401, 0xffff, 0x8, 0x7ff, 0x2, 0xfffffffffffffffa, 0x0, 0x3}, {0xfffffffffffffffd, 0x80000000, 0x7, 0x680, 0x6, 0x16c, 0x6, 0xfffffffffffffff7, 0x7f, 0x1000, 0xffffffffffffffff, 0x5, 0xfffffffffffffff8}, {0x7, 0x2, 0x9, 0xfffffffffffffffc, 0x8, 0xa4, 0x1, 0x6, 0x3ff, 0x3ff, 0x1, 0x3, 0x5}], 0x81}) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:43 executing program 4: 17:01:43 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1521}, 0x28) 17:01:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, 0x0) sendfile(r1, r3, 0x0, 0x10000000000443) 17:01:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fstat(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x0, r4}, {0x2, 0x2, r5}], {0x4, 0x7}, [{0x8, 0x4, r6}, {0x8, 0x4, r7}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:43 executing program 4: 17:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:43 executing program 4: 17:01:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="b7fdffff7fbab77dbf148fa75e3894870a1a3e1020dfe38ca1274e95ba45f42515a0e9cf1da170526c947782f0d9d1d662f9f74b2e4534c445de5cf766ad8aeabc5bad6edbb0b14f32afe33917796592cb7d68f83e3253d96a045e3dc1b98fecee7a3eac4f05ae3a3056c57f1a0d77f3939e9139780900f97de43b96a4e5a41ecef4"], &(0x7f0000000100)=0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000340)=0xe39) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) r4 = perf_event_open(0x0, r3, 0x1000000000000000, r2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0xfffffffffffffe4b) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x9, 0x8, 0x80, 0x944, 0x0, 0x8, 0x2c663, 0x1, 0x1f, 0xfffffffffffffff8, 0xa647, 0x0, 0x9, 0x2, 0x1, 0x2, 0x100000000, 0x0, 0x7f, 0x7fff, 0x8, 0x2, 0xffffffff, 0x96d, 0x1, 0x4, 0x1, 0x1, 0x8001, 0x81, 0xfffffffffffffffb, 0x4, 0x6, 0xff, 0x1, 0x2, 0x0, 0xfffffffffffffff8, 0x5, @perf_config_ext={0x675c, 0x7}, 0x80, 0x2, 0x4, 0x7, 0x9, 0x7, 0xda}, r3, 0xf, r4, 0x1) openat$cgroup_subtree(r5, 0x0, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) ioctl$RTC_VL_READ(r5, 0x80047013, &(0x7f0000000300)) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000080)={{0xfffffffffffffffb, 0x8, 0x80000001, 0x5}, 'syz0\x00', 0x38}) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="0e7a7fe7ffffff00"], 0x8) 17:01:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x10000000000443) 17:01:43 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1522}, 0x28) 17:01:43 executing program 4: 17:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xb000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:43 executing program 4: 17:01:43 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1523}, 0x28) 17:01:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x10000000000443) 17:01:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() setregid(r4, r5) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x10000000000443) 17:01:43 executing program 4: 17:01:44 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000080)=""/34, 0x22) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:44 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1524}, 0x28) 17:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xd000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:01:44 executing program 4: 17:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:01:44 executing program 4: 17:01:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0xc5, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:44 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1525}, 0x28) 17:01:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:44 executing program 4: 17:01:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="feda3981a7307347"], 0x8) 17:01:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x0) 17:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x10030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:44 executing program 4: 17:01:44 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1526}, 0x28) 17:01:44 executing program 4: 17:01:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x0) 17:01:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) statx(r0, &(0x7f0000000000)='./file0\x00', 0x4000, 0x80, &(0x7f0000000040)) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fee1f96c6f72797f"], 0x8) 17:01:44 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1527}, 0x28) 17:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x18000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:44 executing program 4: 17:01:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x0) 17:01:45 executing program 4: 17:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1c020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:45 executing program 3: 17:01:45 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1528}, 0x28) 17:01:45 executing program 3: 17:01:45 executing program 4: 17:01:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000100)=""/101) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000ffa000/0x3000)=nil}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:45 executing program 3: 17:01:45 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) ioctl$void(r0, 0xc0045878) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:01:45 executing program 4: 17:01:45 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1529}, 0x28) 17:01:45 executing program 4: 17:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x20010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:45 executing program 3: 17:01:45 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x152a}, 0x28) 17:01:45 executing program 4: 17:01:45 executing program 3: 17:01:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x80000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x8, 0x64c042) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) 17:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x20100000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:45 executing program 3: 17:01:45 executing program 4: 17:01:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r3, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ff7000/0x3000)=nil) syz_mount_image$f2fs(0x0, 0x0, 0x9, 0x1, &(0x7f0000001740)=[{&(0x7f0000001680)}], 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x2010, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:45 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x152b}, 0x28) 17:01:46 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001500)=[{&(0x7f0000000080)=""/23, 0x17}], 0x1, 0x0) 17:01:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x23000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:46 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="d0"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0xa07000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 17:01:46 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x152c}, 0x28) 17:01:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x800000000105082) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x3975f324) 17:01:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x24000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x100003, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) r4 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', r5}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0xa, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) 17:01:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="fe6da77346e579e37f47656d6f72797f"], 0x8) 17:01:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x24030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:46 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x152d}, 0x28) 17:01:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="ffff0f000a0002000000000000000000"], 0x1}}, 0x0) 17:01:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x26000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:46 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x152e}, 0x28) 17:01:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000000)={[{0x7fffffff, 0x9, 0x3, 0x7ea, 0xffffffff, 0x401, 0xffff, 0x8, 0x7ff, 0x2, 0xfffffffffffffffa, 0x0, 0x3}, {0xfffffffffffffffd, 0x80000000, 0x7, 0x680, 0x6, 0x16c, 0x6, 0xfffffffffffffff7, 0x7f, 0x1000, 0xffffffffffffffff, 0x5, 0xfffffffffffffff8}, {0x7, 0x2, 0x9, 0xfffffffffffffffc, 0x8, 0xa4, 0x1, 0x6, 0x3ff, 0x3ff, 0x1, 0x3, 0x5}], 0x81}) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'bcsh0\x00', 0x1}, 0x18) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0xfa, 0x0, 0x231}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6fa090ce"], 0x8) 17:01:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sync_file_range(r0, 0x6, 0x20, 0x1) 17:01:46 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x152f}, 0x28) 17:01:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) sigaltstack(&(0x7f0000016000/0x2000)=nil, &(0x7f0000000000)) socketpair(0xf, 0xf, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r4, &(0x7f0000000100)="231a87f5292a0ed9ec37371a6ce04b984b8caf95ea46ebc3be233ed6aad202ef638869c4786a842639d4c5e89b1b5160b25757bcfe57128e1836c99f39a0212dd7cb668616784009908219918a243b4baf10d04eb5e41269398a868f3f06628a6a2d3b", 0x63, 0x10, &(0x7f0000000180)={0x2, 0x4e22, @rand_addr=0x4c}, 0x2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000200)={'ip6tnl0\x00', 0x7ff}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) 17:01:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1530}, 0x28) 17:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x26010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendto$packet(r1, &(0x7f0000000000)="cdfb98468bcc8642c821e550d6ef41b9588582113833cc8b2c4530c7fc8bb659bb4bfb4d09293cbb532343e57b418fb7e7f091441431f679e7ffeed05ffba67e3cb7e0c3da4e5dde002132f98677bd1673", 0x51, 0x1, &(0x7f0000000100)={0x11, 0x17, r3, 0x1, 0x7, 0x6, @random="d039649eb6b1"}, 0x14) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000000)={[{0x7fffffff, 0x9, 0x3, 0x7ea, 0xffffffff, 0x401, 0xffff, 0x8, 0x7ff, 0x2, 0xfffffffffffffffa, 0x0, 0x3}, {0xfffffffffffffffd, 0x80000000, 0x7, 0x680, 0x6, 0x16c, 0x6, 0xfffffffffffffff7, 0x7f, 0x1000, 0xffffffffffffffff, 0x5, 0xfffffffffffffff8}, {0x7, 0x2, 0x9, 0xfffffffffffffffc, 0x8, 0xa4, 0x1, 0x6, 0x3ff, 0x3ff, 0x1, 0x3, 0x5}], 0x81}) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$rfkill(r0, &(0x7f0000000000)={0xa2, 0x2, 0x0, 0x1, 0x1}, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x3c000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000002780)={0x9, &(0x7f0000000040)=""/55, &(0x7f0000002680)=[{0x200, 0x98, 0x7bde, &(0x7f0000000080)=""/152}, {0x101, 0xaf, 0x0, &(0x7f0000000400)=""/175}, {0x4e, 0xe6, 0x4, &(0x7f00000004c0)=""/230}, {0x65b323c7, 0x24, 0x800, &(0x7f0000000140)=""/36}, {0x4, 0x1000, 0x40000, &(0x7f00000005c0)=""/4096}, {0x5, 0x14, 0x7fffffff, &(0x7f0000000300)=""/20}, {0x8, 0x1000, 0x148180000, &(0x7f00000015c0)=""/4096}, {0xb7be, 0x91, 0x3, &(0x7f00000025c0)=""/145}, {0x3, 0x31, 0x6, &(0x7f0000000340)=""/49}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = msgget(0x3, 0x40) msgctl$MSG_STAT(r1, 0xb, &(0x7f00000027c0)=""/49) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000002800)=r2, 0x4) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xffff}, 0x4) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1531}, 0x28) 17:01:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000000)={[{0x7fffffff, 0x9, 0x3, 0x7ea, 0xffffffff, 0x401, 0xffff, 0x8, 0x7ff, 0x2, 0xfffffffffffffffa, 0x0, 0x3}, {0xfffffffffffffffd, 0x80000000, 0x7, 0x680, 0x6, 0x16c, 0x6, 0xfffffffffffffff7, 0x7f, 0x1000, 0xffffffffffffffff, 0x5, 0xfffffffffffffff8}, {0x7, 0x2, 0x9, 0xfffffffffffffffc, 0x8, 0xa4, 0x1, 0x6, 0x3ff, 0x3ff, 0x1, 0x3, 0x5}], 0x81}) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:47 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="fe6d650bbbd6ee576d6f72797f"], 0x8) 17:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x90002, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x40000000000011) 17:01:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1532}, 0x28) 17:01:47 executing program 3: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x151d}, 0x28) 17:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x800) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1533}, 0x28) 17:01:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0/file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000080)="48b8ebc8", 0x4, 0x3}, {&(0x7f00000000c0)="77762b5e5f20a1869b0daea3a304d66d552cc469957508b6c4af0734271e0c5f29b634274f6e16cc86f00f88b0a2cdf8caf19f0075b2fc5f540763b762b03e1e651e5f0732a0a285e9031f5696b4d7d600c3f69deb0fe26ba6bb0973b5e4e61655f2403fb24e00037f9d703565168983669e3cc15ca2cd87efff1b0336507904397ebc8b6b4a6d02974b05756541cd24d67025bc508d182f1c4866c4df511414a80b028ba8677ec91953e6f1244a", 0xae}, {&(0x7f0000000300)="515ded7171912fdfc67dd77026fcddea73203e54feeb6254c212bc8dc4a1ecb844b12a6b6d7062b712c732281ff95db0617474a4f94a51a70c326592e08f6c6e0623c58dab3b48baa3c8c14221fe56ea7790a7e6b6e85920eb0f456ba1e8895fffa151c3829a02e811ad21eed4", 0x6d, 0x78}, {&(0x7f0000000400)="3464f5f678cff70a9d856c7a17c3d24bb2089706d576dc7c1eafa122b6ffd8999865e07faccc2e757ea3bee53eb34c3aa7e2710b1d8cf59bc0d0f01442685012559437f780ae4ca0d2195a8743f1df70e1d0c6ea706080190bd7bc098a33d8ce8a2df284c48196e1a2b4029eb5dfbac1624057a855377de46ca2c97097774b49d55b7e2b2c38d3a3cda208dfaf5abd13962baea8db4d60a28a89e22cb242df7ea4d18ff193bd10901fe414c0757ede46ef75c192fd6681ea5fed041b6aa7f3e52835", 0xc2, 0x1}], 0x1000, &(0x7f00000006c0)={[{@numtail='nonumtail=0'}, {@shortname_winnt='shortname=winnt'}], [{@obj_user={'obj_user', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'memory.events\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000880)=0x6552, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$setlease(r4, 0x400, 0x0) sendmsg$kcm(r3, &(0x7f00000008c0)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) 17:01:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000000)={0xa, [0xfffffffffffffffa, 0x7fffffff, 0x3, 0x6, 0x0, 0x9, 0x9, 0x3, 0x1, 0x100000001]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x42534658, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1534}, 0x28) 17:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x46020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x200003) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="da847d7457fdc91804a5e6323234e0ba7cea113e12322fecee31225763496b97a96e2700fce54e9120183e9da41c4b8a3e9b1f25b9113e6e6392a965820086e96c40dd7ccf4c562632a268ceb06834f672266c14e39eba65e92a0c457c57c5b570fb69be9bfb540eaa4409625d20a9835ae1cbb03c4075960035b2de8145ff0bc4a77e0da700d09175b35661db28b706491649dd8b9dd16ca943b9a43660ce368eb3093ed76f20b41ffe7b501c7e2fd8b0d9285b5e337a7715cb65cd539d44fd0cabd80bffa9f54d7902eaf058be6d03cd44d3c00561b38d", 0xd8}, {&(0x7f0000000300)="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", 0x1000}], 0x2, 0x1) 17:01:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x800) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:48 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:48 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1535}, 0x28) 17:01:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0/file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000080)="48b8ebc8", 0x4, 0x3}, {&(0x7f00000000c0)="77762b5e5f20a1869b0daea3a304d66d552cc469957508b6c4af0734271e0c5f29b634274f6e16cc86f00f88b0a2cdf8caf19f0075b2fc5f540763b762b03e1e651e5f0732a0a285e9031f5696b4d7d600c3f69deb0fe26ba6bb0973b5e4e61655f2403fb24e00037f9d703565168983669e3cc15ca2cd87efff1b0336507904397ebc8b6b4a6d02974b05756541cd24d67025bc508d182f1c4866c4df511414a80b028ba8677ec91953e6f1244a", 0xae}, {&(0x7f0000000300)="515ded7171912fdfc67dd77026fcddea73203e54feeb6254c212bc8dc4a1ecb844b12a6b6d7062b712c732281ff95db0617474a4f94a51a70c326592e08f6c6e0623c58dab3b48baa3c8c14221fe56ea7790a7e6b6e85920eb0f456ba1e8895fffa151c3829a02e811ad21eed4", 0x6d, 0x78}, {&(0x7f0000000400)="3464f5f678cff70a9d856c7a17c3d24bb2089706d576dc7c1eafa122b6ffd8999865e07faccc2e757ea3bee53eb34c3aa7e2710b1d8cf59bc0d0f01442685012559437f780ae4ca0d2195a8743f1df70e1d0c6ea706080190bd7bc098a33d8ce8a2df284c48196e1a2b4029eb5dfbac1624057a855377de46ca2c97097774b49d55b7e2b2c38d3a3cda208dfaf5abd13962baea8db4d60a28a89e22cb242df7ea4d18ff193bd10901fe414c0757ede46ef75c192fd6681ea5fed041b6aa7f3e52835", 0xc2, 0x1}], 0x1000, &(0x7f00000006c0)={[{@numtail='nonumtail=0'}, {@shortname_winnt='shortname=winnt'}], [{@obj_user={'obj_user', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'memory.events\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000880)=0x6552, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$setlease(r4, 0x400, 0x0) sendmsg$kcm(r3, &(0x7f00000008c0)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) 17:01:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x184, 0x32, 0xc20, 0x70bd29, 0x25dfdbff, {0x17}, [@generic="a414aa5eaf29970b91270e6e2ff201f8737225c97ceb97698e3b3e3ae4b7211390c61b67b6ba0c0688d3f83ab0589f413537704ce2ab05cbdbcaa34873bc57eecf881b3922a7cd0957b18989d0465cb1a708f994fb34f27e3cb2f7c65c7b99b7ae11faf3e5706c3947e4eaf2b8a7eba3560422df41967f7e0e", @typed={0x8, 0x43, @ipv4=@broadcast}, @nested={0xec, 0x74, [@generic="04d8f3520348076116167ba2ec1e2e7a613537be2cd475140fd3b85853ffed536126062846b8992b0cb897a3ea2906d98f94f6de9b54e25a8c7f14aae92ccabc26faa36a1a6cb74b53c7d02d7e058ea5963c2390ba210a80c90ef5a5a890d61835628084d3f8fdafe2770039ae6315a4f785e9223fc08fdee80d776091258456511ba2120d8619268ee5be619e4379f276660bcd85934ea84962ab4dac1a9ba174396feeff2207dcd4b369923bd39cb01fefc7f9c3880891bceb930a74ecaed2bd04480437104686d2410c7294c90e7af491013b5aeb6351ccfd03694254ebefa47f8f6f8daa06"]}]}, 0x184}, 0x1, 0x0, 0x0, 0x4044}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1f6e7f0000000000"], 0x8) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x8000) 17:01:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x48010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:48 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1536}, 0x28) 17:01:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x100) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000100)={r5, 0x2}) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000200)="bc0eec2437fb1f199b4b2cd0d7e7ddb56be64b971a06ccccb043f3e21f2ea7ac59733f8214717afeb5f4dd0d06bd8b2dfa0ecc69b2948014f48228ff6c0ff78b19bcd6e7edc08261e95e6b5cfbeeec17ddef66430f303a6bce3cc3dd32e9a982b14c828aca82aea4c72078a8880a667913b48d002bd60dda23dd8ee0cb92a69f76b5898d68c35134eef6") syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0/file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000080)="48b8ebc8", 0x4, 0x3}, {&(0x7f00000000c0)="77762b5e5f20a1869b0daea3a304d66d552cc469957508b6c4af0734271e0c5f29b634274f6e16cc86f00f88b0a2cdf8caf19f0075b2fc5f540763b762b03e1e651e5f0732a0a285e9031f5696b4d7d600c3f69deb0fe26ba6bb0973b5e4e61655f2403fb24e00037f9d703565168983669e3cc15ca2cd87efff1b0336507904397ebc8b6b4a6d02974b05756541cd24d67025bc508d182f1c4866c4df511414a80b028ba8677ec91953e6f1244a", 0xae}, {&(0x7f0000000300)="515ded7171912fdfc67dd77026fcddea73203e54feeb6254c212bc8dc4a1ecb844b12a6b6d7062b712c732281ff95db0617474a4f94a51a70c326592e08f6c6e0623c58dab3b48baa3c8c14221fe56ea7790a7e6b6e85920eb0f456ba1e8895fffa151c3829a02e811ad21eed4", 0x6d, 0x78}, {&(0x7f0000000400)="3464f5f678cff70a9d856c7a17c3d24bb2089706d576dc7c1eafa122b6ffd8999865e07faccc2e757ea3bee53eb34c3aa7e2710b1d8cf59bc0d0f01442685012559437f780ae4ca0d2195a8743f1df70e1d0c6ea706080190bd7bc098a33d8ce8a2df284c48196e1a2b4029eb5dfbac1624057a855377de46ca2c97097774b49d55b7e2b2c38d3a3cda208dfaf5abd13962baea8db4d60a28a89e22cb242df7ea4d18ff193bd10901fe414c0757ede46ef75c192fd6681ea5fed041b6aa7f3e52835", 0xc2, 0x1}], 0x1000, &(0x7f00000006c0)={[{@numtail='nonumtail=0'}, {@shortname_winnt='shortname=winnt'}], [{@obj_user={'obj_user', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'memory.events\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000880)=0x6552, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$setlease(r4, 0x400, 0x0) sendmsg$kcm(r3, &(0x7f00000008c0)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) 17:01:48 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000000000000"], 0x8) 17:01:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4f000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:48 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1537}, 0x28) 17:01:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x184, 0x32, 0xc20, 0x70bd29, 0x25dfdbff, {0x17}, [@generic="a414aa5eaf29970b91270e6e2ff201f8737225c97ceb97698e3b3e3ae4b7211390c61b67b6ba0c0688d3f83ab0589f413537704ce2ab05cbdbcaa34873bc57eecf881b3922a7cd0957b18989d0465cb1a708f994fb34f27e3cb2f7c65c7b99b7ae11faf3e5706c3947e4eaf2b8a7eba3560422df41967f7e0e", @typed={0x8, 0x43, @ipv4=@broadcast}, @nested={0xec, 0x74, [@generic="04d8f3520348076116167ba2ec1e2e7a613537be2cd475140fd3b85853ffed536126062846b8992b0cb897a3ea2906d98f94f6de9b54e25a8c7f14aae92ccabc26faa36a1a6cb74b53c7d02d7e058ea5963c2390ba210a80c90ef5a5a890d61835628084d3f8fdafe2770039ae6315a4f785e9223fc08fdee80d776091258456511ba2120d8619268ee5be619e4379f276660bcd85934ea84962ab4dac1a9ba174396feeff2207dcd4b369923bd39cb01fefc7f9c3880891bceb930a74ecaed2bd04480437104686d2410c7294c90e7af491013b5aeb6351ccfd03694254ebefa47f8f6f8daa06"]}]}, 0x184}, 0x1, 0x0, 0x0, 0x4044}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1f6e7f0000000000"], 0x8) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x8000) 17:01:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x52000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:48 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d65556f72797f"], 0x8) 17:01:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0/file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000080)="48b8ebc8", 0x4, 0x3}, {&(0x7f00000000c0)="77762b5e5f20a1869b0daea3a304d66d552cc469957508b6c4af0734271e0c5f29b634274f6e16cc86f00f88b0a2cdf8caf19f0075b2fc5f540763b762b03e1e651e5f0732a0a285e9031f5696b4d7d600c3f69deb0fe26ba6bb0973b5e4e61655f2403fb24e00037f9d703565168983669e3cc15ca2cd87efff1b0336507904397ebc8b6b4a6d02974b05756541cd24d67025bc508d182f1c4866c4df511414a80b028ba8677ec91953e6f1244a", 0xae}, {&(0x7f0000000300)="515ded7171912fdfc67dd77026fcddea73203e54feeb6254c212bc8dc4a1ecb844b12a6b6d7062b712c732281ff95db0617474a4f94a51a70c326592e08f6c6e0623c58dab3b48baa3c8c14221fe56ea7790a7e6b6e85920eb0f456ba1e8895fffa151c3829a02e811ad21eed4", 0x6d, 0x78}, {&(0x7f0000000400)="3464f5f678cff70a9d856c7a17c3d24bb2089706d576dc7c1eafa122b6ffd8999865e07faccc2e757ea3bee53eb34c3aa7e2710b1d8cf59bc0d0f01442685012559437f780ae4ca0d2195a8743f1df70e1d0c6ea706080190bd7bc098a33d8ce8a2df284c48196e1a2b4029eb5dfbac1624057a855377de46ca2c97097774b49d55b7e2b2c38d3a3cda208dfaf5abd13962baea8db4d60a28a89e22cb242df7ea4d18ff193bd10901fe414c0757ede46ef75c192fd6681ea5fed041b6aa7f3e52835", 0xc2, 0x1}], 0x1000, &(0x7f00000006c0)={[{@numtail='nonumtail=0'}, {@shortname_winnt='shortname=winnt'}], [{@obj_user={'obj_user', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'memory.events\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@euid_gt={'euid>', r1}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000880)=0x6552, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$setlease(r4, 0x400, 0x0) sendmsg$kcm(r3, &(0x7f00000008c0)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) 17:01:48 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1538}, 0x28) 17:01:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x58465342, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "3425b490aa92632ade45ff9b8f0b7032"}, 0x11, 0x3) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x60000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) close(r0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000040)={0x0, 0xd9, 0x7f, [], &(0x7f0000000000)=0x1}) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:49 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1539}, 0x28) 17:01:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0xffffffffffffff00, 0x88, 0x20, 0x604}) 17:01:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x184, 0x32, 0xc20, 0x70bd29, 0x25dfdbff, {0x17}, [@generic="a414aa5eaf29970b91270e6e2ff201f8737225c97ceb97698e3b3e3ae4b7211390c61b67b6ba0c0688d3f83ab0589f413537704ce2ab05cbdbcaa34873bc57eecf881b3922a7cd0957b18989d0465cb1a708f994fb34f27e3cb2f7c65c7b99b7ae11faf3e5706c3947e4eaf2b8a7eba3560422df41967f7e0e", @typed={0x8, 0x43, @ipv4=@broadcast}, @nested={0xec, 0x74, [@generic="04d8f3520348076116167ba2ec1e2e7a613537be2cd475140fd3b85853ffed536126062846b8992b0cb897a3ea2906d98f94f6de9b54e25a8c7f14aae92ccabc26faa36a1a6cb74b53c7d02d7e058ea5963c2390ba210a80c90ef5a5a890d61835628084d3f8fdafe2770039ae6315a4f785e9223fc08fdee80d776091258456511ba2120d8619268ee5be619e4379f276660bcd85934ea84962ab4dac1a9ba174396feeff2207dcd4b369923bd39cb01fefc7f9c3880891bceb930a74ecaed2bd04480437104686d2410c7294c90e7af491013b5aeb6351ccfd03694254ebefa47f8f6f8daa06"]}]}, 0x184}, 0x1, 0x0, 0x0, 0x4044}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1f6e7f0000000000"], 0x8) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x8000) 17:01:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x62030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:49 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x153a}, 0x28) 17:01:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) 17:01:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="a88dc5bb9ae6af79c22bd83d966cab73d924f06e4180f95dc347e95917cf0705812b1f255e7b01e7b9c42f213a75fbc3b08c15edc2f11febe343b47118dc5e272ca16f31ed43632454f4659b244e1a7d80f8f61073a29de2f933e42bfa980c81ecd440970903e565d8ef59dacd35f01ecc9356"], 0x8) 17:01:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x64020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:49 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x153b}, 0x28) 17:01:49 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x40) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000380)='timers\x00') r3 = openat$cgroup_ro(r2, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0xffffffffffffff00, 0x88, 0x20, 0x604}) 17:01:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:49 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000000)={0x0, 0x0, 0x42, 0x5f4, '\x00', 0xffffffffffffffff}) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) getpeername$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:49 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x153d}, 0x28) 17:01:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x70000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000180)={0x0, 0x8}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) rt_sigprocmask(0x1, &(0x7f0000000000), &(0x7f0000000040), 0x8) r4 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_FBUF(r4, 0x4030560b, &(0x7f0000000140)={0x60, 0x20, &(0x7f0000000200)="50d00a2fa6bf9f97329f4951a0408dd47eb72bcde472961393a12247c62adb8eb005ad7231ed71b724b285f870f101f74b2942938e47aa68a042d0eeefbe6b0b52f40e59db0ada48e164b90a744a7d2f5e8817c97b75f7fd7f7af17a5964b5f3d11d307ecb84fe0f95474efcf49293b57895e518f39e266ef89a43ffbebede6dfb9c36ce383f90665f72fb6b36babc54015d4ef04b6a6fdf5a9133dd184a6a4ffbec1d861a3765e671ac7c04a9bedb102e17cbf3e5b8ecda2320da0f7053d1e0644744fca7311f4bb7282c9b269e22b520e2a7749a4a07", {0x7fffffff, 0x0, 0x31363553, 0xf, 0x2, 0x3, 0xc, 0xfffffffffffffffa}}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xfffffeb3, 0xffffffffffffffff, 0x0, 0x100000200) 17:01:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xeb/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x3ff, 0x289, 0x4, 0x7, 0x0, 0x4, 0x21, 0xeba6de67fe02f52f, 0x3, 0x2, 0x1, 0x3, 0xff, 0x5, 0x100000000, 0x7f, 0x5, 0xffffffffffff67ce, 0xc30, 0x100, 0x2, 0x7fff, 0x7c1, 0x9, 0x2, 0x640000, 0x1, 0x2, 0x2, 0x9, 0x6, 0x0, 0x800, 0x5, 0x5, 0x2, 0x0, 0x100000001, 0x4, @perf_config_ext={0x2}, 0x1000, 0x51f, 0x40, 0x7, 0xffffffffffff0000, 0x81, 0x2}, r4, 0x7, r1, 0x9) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) accept4$llc(r0, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) 17:01:50 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x153e}, 0x28) 17:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x72000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@security={'security\x00', 0xe, 0x4, 0x598, 0xf0, 0x360, 0x0, 0xf0, 0x360, 0x4c8, 0x4c8, 0x4c8, 0x4c8, 0x4c8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast2, @dev={0xfe, 0x80, [], 0x26}, [0xff000000, 0xff, 0xffffffff, 0xffffff00], [0x0, 0xff000000, 0xffffffff, 0xff], 'ip_vti0\x00', 'team_slave_0\x00', {}, {}, 0x2f, 0x0, 0x4}, 0x0, 0xc8, 0xf0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x70}}}, {{@ipv6={@loopback, @loopback, [0xff, 0xffffffff, 0xffffffff, 0xffffff00], [0xff, 0xff, 0xffffff00, 0xffffffff], 'vxcan1\x00', 'syz_tun\x00', {0xff}, {0xff}, 0xff, 0x7f, 0x4, 0x9}, 0x0, 0x248, 0x270, 0x0, {}, [@common=@unspec=@nfacct={0x48, 'nfacct\x00', 0x0, {'syz1\x00', 0x6}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x7, 0x7fff, 0x8, 0x6, 0x28, 0x0, [@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @empty, @remote, @ipv4={[], [], @rand_addr=0x800}, @empty, @rand_addr="d694733582b1237bb863f1f55e075fa8", @rand_addr="24dafdad3283b04b002274653973ef2d", @mcast1, @mcast1, @dev={0xfe, 0x80, [], 0x22}, @mcast1, @ipv4={[], [], @loopback}, @mcast1, @ipv4={[], [], @broadcast}], 0x3}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x4}}}, {{@uncond, 0x0, 0x140, 0x168, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x36ad, 0x5, 0x1, [0x8, 0xff49, 0xadf, 0x6d2b, 0xee4a, 0x6, 0x186, 0x0, 0x3, 0x9ccc, 0x6, 0x6, 0x0, 0x6, 0xffffffffffff3309, 0xbb98], 0x2}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d2, 0x10000, 0x400, 0x2}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x5}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xcf2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x34b8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x1, @multicast1}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000a00)="2d43ec6a7205d9947bb105360e730aab004072fbf28a83c7426d107c3e18ae6d79ff0c676697d9772a5592ed1726d1404b9dc17870a0567d81668927a9c83e81656640b3d8e35be464f0fae5a506aec996297381661f4019e1a7c49f66d795afaa3c4677c98d47b0b35fd262c25d64aaee8be81029c816d69658dac9821af754c116719fca9a12870a6c03603273628e05c436da10039694db136851658fd06c1f775327f4321f602884f2c44da464f81e495caf4a71e6e5c5f34d8bfd2410413406120d89089d6a5220ad2fd442c57a36bd61d980f30ed2d1c51e7c3d9b9a98bd084d02204ebd4729d07be2d4f1d936d350b91c332486", 0xf7}], 0x1, &(0x7f0000000300)=[{0x60, 0x11b, 0xe917, "be33ab5e92081d6ba66acc97ec84596f9fc4ab80dbb59cf56953e4fe1a66e001a0492af3fa436f530521e5d4b48050fbf9a672568698c99112b5927793bf3af65356b104870c399965d76135"}], 0x60}, 0x44000) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0xfffffffffffffff7) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000000)) 17:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xeb/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x3ff, 0x289, 0x4, 0x7, 0x0, 0x4, 0x21, 0xeba6de67fe02f52f, 0x3, 0x2, 0x1, 0x3, 0xff, 0x5, 0x100000000, 0x7f, 0x5, 0xffffffffffff67ce, 0xc30, 0x100, 0x2, 0x7fff, 0x7c1, 0x9, 0x2, 0x640000, 0x1, 0x2, 0x2, 0x9, 0x6, 0x0, 0x800, 0x5, 0x5, 0x2, 0x0, 0x100000001, 0x4, @perf_config_ext={0x2}, 0x1000, 0x51f, 0x40, 0x7, 0xffffffffffff0000, 0x81, 0x2}, r4, 0x7, r1, 0x9) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) accept4$llc(r0, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) 17:01:50 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x153f}, 0x28) 17:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:50 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="fe6d4bef656d6f72797f"], 0x8) 17:01:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000100)) chdir(&(0x7f0000000140)='./file0\x00') r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000000)) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) 17:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x80010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:50 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1540}, 0x28) 17:01:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xeb/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x3ff, 0x289, 0x4, 0x7, 0x0, 0x4, 0x21, 0xeba6de67fe02f52f, 0x3, 0x2, 0x1, 0x3, 0xff, 0x5, 0x100000000, 0x7f, 0x5, 0xffffffffffff67ce, 0xc30, 0x100, 0x2, 0x7fff, 0x7c1, 0x9, 0x2, 0x640000, 0x1, 0x2, 0x2, 0x9, 0x6, 0x0, 0x800, 0x5, 0x5, 0x2, 0x0, 0x100000001, 0x4, @perf_config_ext={0x2}, 0x1000, 0x51f, 0x40, 0x7, 0xffffffffffff0000, 0x81, 0x2}, r4, 0x7, r1, 0x9) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) accept4$llc(r0, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x80020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:50 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1541}, 0x28) 17:01:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{0x3ff, 0x8, 0x5, 0x8}, 'syz1\x00', 0x1a}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) 17:01:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) 17:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x80030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:50 executing program 3: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14f1}, 0x28) 17:01:50 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1542}, 0x28) 17:01:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x80969800, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x8000, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x0, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c880}, 0x20000000) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000540)=0x4b9b, 0x4) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r3, 0x9e, 0x7, [0xffffffffffffff01, 0x8, 0x9b, 0x5d5, 0x6, 0x8, 0x9]}, &(0x7f00000000c0)=0x16) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:51 executing program 3: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x14ee}, 0x28) 17:01:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:51 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1543}, 0x28) 17:01:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x200000, 0x0) r4 = accept4$nfc_llcp(r3, 0x0, &(0x7f0000000540), 0x800) fcntl$setpipe(r0, 0x407, 0x81) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000400)={0x0, 0x0, @ioapic}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$TCGETA(r5, 0x5405, &(0x7f0000000180)) ioctl$DRM_IOCTL_UNLOCK(r5, 0x4008642b, &(0x7f0000000340)={r6, 0x4}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000500)=0x5000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000021000/0x3000)=nil, &(0x7f0000013000/0x4000)=nil, &(0x7f000001b000/0x2000)=nil, &(0x7f000001c000/0x4000)=nil, &(0x7f000000d000/0x3000)=nil, &(0x7f0000010000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000015000/0x3000)=nil, &(0x7f000001a000/0x4000)=nil, &(0x7f000001a000/0x3000)=nil, &(0x7f0000020000/0x1000)=nil, &(0x7f0000000200)="a8ae9eb73607ae1c849225f39f644a130467767f1f7335c5f47ba8efd67cd7b0b720eac57362e1636314add0c490f22d87725f1364a4514d21255fb06cb75dc2850b488e6d5b1c37a4fbde9b3d9bc2ca67493a308b36cffd69c5d64d30e0f2640283a9002048955e9d987b9a547f9a17e9140c67e15ef523dc37db83594fadf6a58e6afe626da0cb052a072d8c0a74999c94eba0993ab29c3dc7fbef7c631abfb1a1de10876dd64739031ca7e27dc153a8ba427717bef65295acaabd4c457e68ac6272d37f5470d20a9a2b50f020adeea9320887f0e24bf7a8c044fa48dfbab7a9534cd28d3890f157", 0xe9, r3}, 0x68) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000580)=0xfffffff800000000) ioctl$SG_GET_RESERVED_SIZE(r5, 0x2272, &(0x7f00000005c0)) ioctl$VIDIOC_QUERYCTRL(r5, 0xc0445624, &(0x7f0000000380)={0x1, 0x3, "0b159c47ad827487dd001db47cfe7acc069086b7a48ba795e2e065240fe77da6", 0x100000000, 0x1ff, 0x2, 0x6, 0x20}) 17:01:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x86000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init1(0x80800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:51 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1544}, 0x28) 17:01:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8c000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffffffffd72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x7, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1, 0x3, 0x4, 0xb4, 0x8000}) r5 = socket$kcm(0x2, 0x9, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0, 0x0, 0x0, 0x39b}, 0xfd00) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f00000005c0)=ANY=[@ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYRESDEC=r1, @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESDEC=r5, @ANYPTR64, @ANYRESOCT=r3, @ANYBLOB="db33cd1d8bb3c0d7a049ae00c376cb960afec5f6488f7b57af2eb77e8ee0c442fd9210f1c820c221da4e05d0474e0274490a9afac8a464d6fb8c464fc7746c", @ANYPTR], @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16=r2, @ANYRESHEX=r6, @ANYRESOCT, @ANYPTR], @ANYRES64=r3, @ANYRESHEX=r1, @ANYPTR64, @ANYRESHEX=r5, @ANYRESDEC=r6], @ANYRESDEC=r0, @ANYRESHEX=0x0], 0x42) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)={0x3fc, 0x0, 0xf, 0x0, 0x70bd2b, 0x25dfdbfe, {0x1}, [@generic="68a9fc23e79097edca986e0f4d2bf4bae565a8a79444cc9352db569197e1fc91b9a5b45dbf31f0de1d890004516a02176d5e67928eff2f558e382b6b8cf8df9a0f6efc84ae97b8bc13549187c3d40017834f903407ae060838806225ebd6223d02f777af21b09d3e8030d7a4442a748d9455c85088d120228283ad01ee5686f150c928171c091d82cd8c556a1c472e1ee832ea6e68f8097df46bac194828f54538b3445c2f", @nested={0x204, 0x28, [@generic="fe24f224a7f131d65014fddbf519f6026db74c6d59a38491e73549f5ee050aefac52bceafb4687662654667c653f493ae25e15bf2b751dbc36b0e9da19cfa2e638a64c4524de973ea4bed6f0ec3674f6057433e0fb252cc620aa838c6badbfb14d", @typed={0xac, 0x39, @binary="2f0f78c4c90e6a059086096b738397cf3ecdbe11823ed4163d300212168b11f4ab30f13bd94bbacb429600a9c9e76e8400d8bc29b5265c2bd7946bc4bed025dee2e916af1780cddf2b97a4209392818b75d9c60318f858c5135d223d683e5fa69510bbe2cfe1a295cb9a45d097ad0375b8f4fcd8384e9eb4acd8a3065a96de91a1c2a6dd2933f8696638bbbccf9f7a37d4dcb51dd9fcf25cf3d17837f7de5787ae52154178"}, @typed={0x8, 0x10000, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="68e2c18f44b5797723d02c5f1b40d0f5cccd54cdb9da41569c7735c078a9285867d0b28241c2a7a7731d3e08aa7bdd9adebf9977d83c45800ffbcdeb5f8905f10995ab7876c992d3e69083cbdb461d0d2c8204c1e35455dd8caaed36306c660d7f073ea20ba9e3e26c74bcd455f0b4e0fe1703253a5122e41d426e47d023a902c6d6dc56a5406525d90eecc2c45f0433ce1e51d39cce7c57be1411abbeea7f76252a638706936bb776b88ab5f27bac3d6d8fc9a9ac7e194a6170a1c521297efb0339fb5553046bd5bdfd366d69ebf797e259b292b945f56e5e3aa6706f713c1ef58a515a11dfac9488"]}, @generic="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", @generic="3e663d148f05cfa080002b2014f7a5ed4e31011c6fbbe76d42b892b71eb64cac5ee4681cf630a0c26a9f75e6cd34552fc53f9a826e90447be526ec", @typed={0x8, 0x6, @ipv4=@remote}]}, 0x3fc}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 17:01:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:51 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1545}, 0x28) 17:01:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa6010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x40) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:51 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR, @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRES16=0x0, @ANYPTR64, @ANYRESHEX=r4, @ANYRES32, @ANYRES32=r1, @ANYRESOCT=r0, @ANYRES64=r3, @ANYRES16=r3, @ANYRES32=r0], @ANYBLOB="2435affad5051b38dd0a4c9774da29fb821e48614bab6be6904f5287754bbdcc75a77275825c70cdb83c46dddf1476a193a01dac992add6178e60e94d86a24", @ANYRES32=0x0, @ANYRES32=r5]], 0x8) 17:01:51 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1546}, 0x28) 17:01:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa8000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:51 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1547}, 0x28) 17:01:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa8010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = request_key(&(0x7f0000000580)='ceph\x00', &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000540)='-security(\x00', 0xfffffffffffffffa) keyctl$reject(0x13, r3, 0x3, 0x12, r4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) lsetxattr$security_ima(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v2={0x3, 0x2, 0xf, 0x2, 0x8d, "f9b55702c062722fb8d4d648a1fbb2aac454a81c0bf2f604a7f78a936cb7cdceb94acb6f5a8df049ccc530d8fcd541d48ada472bd9aa07f7742208f9d990fd385cdd68d78adfa76b5f688e07ff72abd2c837f88254c4474b8e8f5e01bd572c3ebe22687aaebc3fafbe35eab1c8ddb0695467b48c4ccc660e5f1545eaf2405ac9d55f7bbec3f5b9f4457f780612"}, 0xffffffffffffff89, 0x2) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000300)=0x400, 0x4) request_key(&(0x7f0000000480)='big_key\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f00000005c0)='syz', r3) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000340)=@req={0x7, 0x4, 0x2, 0x100000001}, 0x10) 17:01:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:52 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1548}, 0x28) 17:01:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r4 = dup(r0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r4, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xc0, r5, 0x421, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff1e}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xae020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:01:52 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1549}, 0x28) 17:01:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xb0020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:01:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x1bc, 0x1, 0x0, 0xa04, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@generic="1e612a837a4edadae7f896130d4ec61a14e9564ce110a7c27f953f9dcc3080168feaea90f33b8e63a4439ee7757284a174c36febf02259f3736fcd341cb13aab6c4ce5ead73dbdb2fba890dfeedf2ba930689337a21c84002245ce208c06c816637b8b2a9fd41db31cf62019248441830e51226e692da6d2e7bb2c8e5128f22a92f2769e78df104b59671c05abca59063eee07c6bb2a0382f4e98115fddecba39650b435b6cac36cb82899c3ee0dbb4f73bde9d8a0ff683adc997e0616720a85be24c089740ee43e9dd2149dfbab", @typed={0xd8, 0x5c, @binary="71ea3a794190df2d504bbc5910717842bb9288c7361da0232c7e3c4b567a5d19df1021b41a18829e5b92f6adab462acaf8d727cae66405910af930b53f883bfe11e318b0ae587b97f1fbc70cb8c85b3fdd86620c4d0f236236be9297e9667b107716bd9c9c694f92a7324e9de5ffefc3a607f0e2299fd939187b4370039313a49fbb2bf1c94c4a88a41e54aa159182c80f527f3aeec8caa6484d240edbeb57a87e9fa5c4e045fce90c18b89c811dbba7febec807b22eb6d3f5259915142e689eb41cb851f4a186bf986483819db5fe9dd9540e43"}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x24044000}, 0x8000) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:52 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x154a}, 0x28) 17:01:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xba030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:52 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x9, 0x20400) openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="fe6d3852a6e5b27e5683e9057c000000000000"], 0x8) 17:01:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:01:52 executing program 5: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x10000, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x40000000000011) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000280)={0x2, 0x5, 'client0\x00\x00\x00\x00\x00\x00\xb7\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 0xffffffff80000001, "00000000000000f5", "baa120a32d57e090942de4eacad3b9917c9cd6cc886353f87620ab6b7a9778c2", 0x9, 0x1f}) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x402) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video0\x00', 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x800, 0x0) clock_nanosleep(0x7, 0x0, &(0x7f0000000140), &(0x7f0000000180)) 17:01:52 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x6) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc0010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:52 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x154b}, 0x28) 17:01:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)='/dev/audio\x00', 0xb) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:53 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x154c}, 0x28) 17:01:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc4000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x100000000000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x3) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:53 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x154d}, 0x28) 17:01:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc4030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xd4020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x404c00, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:53 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x154e}, 0x28) 17:01:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x10000000000443) 17:01:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xd5030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:53 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x154f}, 0x28) 17:01:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000000)) ioctl$KVM_NMI(r2, 0xae9a) 17:01:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x10000000000443) 17:01:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe4020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:53 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="fe6d656d6f72797f1a5755a15c9fde260f9f504f11277b4518dedce0baf2e35a9e3d3da397f4a64811c784f288c25ce939a728d1c8b1344508a98f82dde26769f8a3f85c5cdd324edc17ae29a6fd9af10fda624c26a737f43e9bd8b4cdb56a127553c54df0c2c83446697d20d3304bd5200bd91e800e18fd1509abbbedbd4aab315b8e9f50728ca866cc045d52"], 0x8) 17:01:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:53 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1550}, 0x28) 17:01:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x10000000000443) 17:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe4030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:54 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1551}, 0x28) 17:01:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe5030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:54 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x3ff, 0x0, 0x3, @discrete={0x8b, 0x7}}) 17:01:54 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000400)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r2 = msgget(0x1, 0x8) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000040)=""/234) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:54 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1552}, 0x28) 17:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe8010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xebffffff, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:54 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1553}, 0x28) 17:01:54 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(0x0, r1, 0x7fffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="3e1c91925840f5d6"], 0x8) 17:01:54 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r1, 0x0, 0x10000000000443) 17:01:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f00000004c0)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000100)="030d0dfb949fe9e0ee091d89cc7e51d8ad0301dd75737e581e4316e11dbc0ba1c9e5823dfdb6cbbdbc033794bd88d7017ea4eb6e2d3f8953b894a6cf20aae2a511d1a3df97fe4d209c5306c9287da0b7b8982f3bda35d5bf885f62f79357603ed64c54509a0d92b24a6ef68c9d4964a0650b8a1c193c6586fba03a790e4a4308c68472e8ee", 0x85}, {&(0x7f0000000200)="d27bf25954622ae0db226543e2b2462ca80f2c3393b639b44578508de85150a6dbcb2270b4dffccad59213147ecf1370bd9c7804c77ab2d7cadac1bfae1fc1f39b47aae8f51c28a72835c804bfaa409178023ff9099a63400499c2c7e4452aaf2bd6d7678d09e66ded0399996277a40974097a4b165e9921189b4a7e420de137d58987067bc065551a31f1f8c668597a5d8be0e91230d14a4ecdaf6c580dec41828e106646f6c16b0abca37c0f40f6e8ca55087b9abc3b95cd2e5694617b324669358165ef53339e364fb4d14b5ffecd44df2b71262cb234e5f3e57629f3a3d3380c3a25d03d8e", 0xe7}, {&(0x7f0000000300)}, {&(0x7f0000000340)="ab7166ca574aca1b1e226d7f2899595edd560d8c5f0a5b1bef23c205f2f8fc5e818dc4e863af22e385fb2d97a8bc370f78f3e86448832795464290cbc33ff8606b71c79e84289aa6b7c5cfbac8ea9ff0a36a3b3d875e4129", 0x58}, {&(0x7f00000003c0)="8b13a4ef303dfa6488e89c150b80b2dd9343ca2370b92ec342c4176623ef8f59e481cdb0f9c555ac226698465566794eb91025f64ad5dd053e82bec0083acc2efb518c189fb52ecf52fb68d7265c4d99d915117e4bcfe51a7a7d31915bf21b890f2f", 0x62}], 0x5, 0x0, 0x0, 0x20000011}, 0x800) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) ioctl$KDADDIO(r2, 0x4b34, 0x3ff) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000500)=0x10001, 0x4) 17:01:54 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:54 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1554}, 0x28) 17:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xec000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:54 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r1, 0x0, 0x10000000000443) 17:01:54 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000002, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xee010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:54 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1555}, 0x28) 17:01:54 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="176c404b3e935b40a9eb38f58a88bf677c", 0x11, r2) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:55 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:55 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r1, 0x0, 0x10000000000443) 17:01:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf4000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000040)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:55 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1556}, 0x28) 17:01:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf6020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:55 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='\x81\"\xfa\xf2ry.\x01\\t\xab\xb5/\x00{\f\xce\x9f\x19\xd4\x81Y\x91g8\n%\xa2m\xa7v\xe2\xe19#\x06\xf8<(C\xb0\x94\x1a\xf5\xed\xb0\x96\xba\xfe\xc7\a_\xca\x0eH\xd4\v\xd0M]j\x95\xb9\xd7\x84\xa6\x8e*r93\xed\xe2\x87\x82` 1\xf1Il\x89\xa8Z\xf7\x0eE\x8e\xe9\xef?B\xa6\xc9\x00\x82\x8b/x=\x9d\x85\x1cec\xf5\x97\x1d\x95\xf2+', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:55 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:55 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1557}, 0x28) 17:01:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf9fdffff, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:55 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1558}, 0x28) 17:01:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfa030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) r3 = getgid() lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000340)=[0x0, 0xee01, 0xee01, 0x0, 0xee00, 0xffffffffffffffff]) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000006c0)={{}, {}, [{0x2, 0x1, r1}, {0x2, 0x5, r2}], {0x4, 0x2}, [{0x8, 0x2, r3}, {0x8, 0x4, r4}, {0x8, 0x4, r5}, {0x8, 0x2, r6}, {0x8, 0x4, r7}], {0x10, 0x4}, {0x20, 0x6}}, 0x5c, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x1000000000000002, 0x0) getpeername(r9, &(0x7f0000000600)=@pppol2tpv3, &(0x7f0000000680)=0x80) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00'], 0x8) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sequencer2\x00', 0x80000, 0x0) chroot(&(0x7f0000000780)='./file0\x00') 17:01:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfb030000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:55 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1559}, 0x28) 17:01:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x800000002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x1, 0x400000) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000180), &(0x7f0000000200)=0x10) r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000001, 0x80) getsockname$llc(r5, &(0x7f0000000040), &(0x7f0000000100)=0x10) 17:01:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfc000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:56 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x155a}, 0x28) 17:01:56 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="0e00620000000000"], 0x8) alarm(0x40) 17:01:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfc020000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:56 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x155b}, 0x28) 17:01:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:56 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xff0f0000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:56 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x155c}, 0x28) 17:01:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000000)) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000100)=0x8) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:56 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_proto_private(r0, 0x89e2, &(0x7f0000000100)="66901ed902ed3066387e09b27a9edc84eec6497cac3447709af3c446ced771c7e096ce224cf53dc9413e") r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) fstatfs(r1, &(0x7f0000000000)=""/204) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:56 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x155d}, 0x28) 17:01:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfffffdf9, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:56 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:56 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x155e}, 0x28) 17:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x80000001, 0x420280) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000100)=0x6) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:57 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) write$P9_RSTATFS(r0, &(0x7f0000000000)={0x43, 0x9, 0x2, {0x3, 0x2, 0x10001, 0x5, 0x800, 0xa8e, 0x1, 0x38e5, 0x3}}, 0x43) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) 17:01:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:57 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x155f}, 0x28) 17:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xffffffeb, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:57 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1560}, 0x28) 17:01:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x17bcc81d997, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x1fffffffffc, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)="45adb6653232aff3571bd0d459aa264aaa4a2ff91bd15eb1818df991e8814d631de7c9dd69e362fb1af7ac7dade9e4a51d8ea4de89aa74c6", 0x38, r1}, 0x68) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:01:57 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1561}, 0x28) 17:01:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x17bcda6c99f, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x17bce76e04f, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:57 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1562}, 0x28) 17:01:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000040)) ioctl$KDDISABIO(r1, 0x4b37) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000080)) ioctl$TIOCCBRK(r1, 0x5428) fcntl$addseals(r2, 0x409, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000000)) 17:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r0, r2, 0x80000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:58 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1563}, 0x28) 17:01:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) 17:01:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:58 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1564}, 0x28) 17:01:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x3000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5", 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:58 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1565}, 0x28) 17:01:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:58 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) 17:01:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5", 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5", 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:58 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1566}, 0x28) 17:01:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="5000d70000000000"], 0x8) 17:01:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9", 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:59 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1567}, 0x28) 17:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9", 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:59 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d5372797f"], 0x8) 17:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:59 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1568}, 0x28) 17:01:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9", 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:59 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1569}, 0x28) 17:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfff, 0x0) recvfrom$inet(r1, &(0x7f0000000200)=""/233, 0xe9, 0x100, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x6) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x11) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:59 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x156a}, 0x28) 17:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:59 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x403, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) 17:01:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000000443) 17:01:59 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x156b}, 0x28) 17:01:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:01:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:00 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f00000013c0)='/dev/vcs#\x00', 0x200, 0x20000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000001400)={0x5, 0x9, 0x4a, 0x1, 0x6bbf}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xd51, 0x4, &(0x7f0000001340)=[{&(0x7f0000000100)="14473099832200f9b09e011d9caaadac417831c531b2b312efdea72c97b99ac58b8a574ea3213321992abb1917a0f083f0c1f8c243b8c80c783670986907f7a1afef7f5b77eb6749a8049fd12fe4787818e6c000a5660c0dfa5cf8e9e4097a1c88e196e42a19aa48a66d434b", 0x6c, 0x9}, {&(0x7f0000000200)="2fd88992151776587258b5cb57155474751b8735e788993ede9ee8bfec4f13d8e6dc67c80f82d356714810cf91eb532ee75047723a50cc07b3ef097a0628b5d6d2cfbf76dbcfec346523d1055c2b90eda5c3ebff88b22004a78a43ea3c372a124105e9f211d91bf0e5c2ce5170f606b6f976fb5d663ea8b3282ac01a539d7b5e45e8115e6d15837678ca8fadea3461", 0x8f, 0x8001}, {&(0x7f00000002c0)="15fd30fcce496a729675fc236c861dbe8f059aa640eedb9dfea5adf4a48b263f342c9041489b42702e211219df3ef7ce90eb4dafa6853a2d293a88901532ca66c079362b9b670d351bfe2e71ee85631536dbecf5b3b0798f8a18a34a6a", 0x5d, 0x100000001}, {&(0x7f0000000340)="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", 0x1000, 0x5}], 0x8000, &(0x7f0000000180)={[{@noquota='noquota'}], [{@fsmagic={'fsmagic', 0x3d, 0x4}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:00 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x156c}, 0x28) 17:02:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x800, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x101000) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:02:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x800000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x10000000000443) 17:02:00 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x156d}, 0x28) 17:02:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2226.968820][T30355] jfs: Unrecognized mount option "fsmagic=0x0000000000000004" or missing value 17:02:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x10000000000443) 17:02:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x10000000000443) 17:02:00 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0xfffffd1b, 0x0, 0x800, 0x0, 0x8001, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) chdir(&(0x7f0000000000)='./file0\x00') sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:02:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x108) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000200)={0x3, 0x0, 0x2080, {0x5001, 0x1000, 0x3}, [], "baa024123fa76de0c1fdf49a45d28c4c901f3fdf5cbdff45b3808b8106bc42a744e5d81959dedaec8988d9fb44d6802f5e1d01d7ca52995db13c1558dce1dd62852fcfdfb9bb921578048f042fc25cc20c1ba65705a874b11c89f626a122a69bac98136377d5d51bad2f98f3fe6f748879bbdb3f82d1421a028e11536a0394b0cc5d3585fc3306ea81ae87829452c3651236feac37c22dd8ab930bf198e96046f0846b7bbeadf149a19c19d8d59b812ea4c165180ada0bdca8c4b042213ae4dd04e2c9c7ae000fdd661e8f695dbacd64067267e2c2b1d514223ccf215608b5454836cf8fc6143d7c7099a981ac55b7c9b474af3239d6d023621871fb24f37d02fc999a7c6305485b776a78635634a649de19f86528b74871fbaa90c44873d00044bbf4e6335942dd0adc6f1c5dba93d81dd6f5e973b3f4e18761ffaecefdf273be15743d699d44abf42d997de4e1a8282477f0e7dfd96dc7950c701bd8aee5a2e5b65a254bfe4ee2660befb92b000f86e842e9f110e8338d1ecb708aad5adac44bab2d3bff3780c71a719ee509573fca402b1fe862022dda04a75682e02e040c63e12ea45661a438198e7ff639620459981156f21c65c800d3e5373b079bfdba2d35bd4a45519f5c9c02155d007bd44ce00da1745ccfc6cc9c98adaeddf0139232d9c3d9fea49638eae90bf254864150b12ba89a2c3408a191d0ad5be1360165f95a660836816a4e0c8cc474630c4afa65676670cd06ecb433b4078e7ad04d6db9ebed6b5f7cfb40a673a9cff6036fd9051fd685cfe7f7279b4cc30ca132d5fecb670a107e6fa199388fd481a21330245e914ac20b38a318761b7f210bfe2d63c84889308f4cba2fc48aa7b6ed64fa75c12596b7e24a430263f18cf6756da8546bc05b43cfead4bc16f8c7b5612d8939e14d83f88e999432042fca7bc7e7b9c5fa0f0bd8a3f417a6de93ac85443df111270a39334ccb12c0c110b42118dffeb0f1ab75cdc7f180762f6cd836ab7b2377750975401c886ca1ebad567f61952ca0a916929ea863b9487a231a4101a15626c83086fa9b2c7d41ccf6daa3dbb4cc31d41ca767471e7da93daba982f66365a6275e7271e2415e1313bccfe6ae47e94edd2f2f1470dce452d3c31e6548483554df21ceb01d34911d7d769500d7ab49b710d5ae9c990c6367c145ce706159fb8a727b9944e74f9204b2aa8af87520162cbdf90dadc753941a82ef7ed556b1480b7cc1aeb1e7d7bdb5d9554fef2abd653f31b50cca1025274ddfd20eeab00946c62a61a9cff7c3cc5b1e15a795b253a1484e568bec95d345895f9dadaf5c6f0fdd3cebf6eab211bcadb34faf843429e0d7c7813084319bad79ccb0c9e0212766e6f3db9c86b5fb7f9f429ff6859086406f22a24474779d4f86138a9360d7a1606ccbc9fef5a0d63dbeefd1a6fb6f05adba07f6d5dc5c406497cf4bec1306e00e65432a0ec3cc101e518f75e6b01ef41e93dce4a9b8c3829efa16281ad0628294ca5c7fa48ce337a880eb8072fb555cda672ea2facc54b36d7c068868e98718fbfae3b96fdbd1a1aef5386ea0b0a763bef5e4d883d0c6519d9f91761eed05bf1a7b942469dab4b408c8cf8a7df9a6a41e02f76a2c0d2ee3186428832545f299976a5e073bdbb1084cc39aa2deb01c8507122d3571273f995d05ebf29749a9e27800d99918962538ebbca4dfbfb9ae8ad3d826c51c85366c4081375a069de82e9fa2fc5e3912ce749d106a58a73f4dca7bd2a74f1f6c708ab89597095457b31abf22bda59ad30e0bcf53b6de055b4891675b7bd6a2a2e9b87c1c529b57ea386116d5c4402921a76e0126a7836c04f305910010b8f7d6b44d874ebd68ab922c426b939c5125c5402f2489a76da87b658e223de1ee1d4cef9d7f23a405c2739dac82a398b49d95f9d1f43972e12c449e544ad0168b20b6f94e4beba0e1f197140c0ae653574a66122465b05b605ccc35ef0ef7abc438dab69806dc8cedefc542dbf8fe23c51a4942bf0195dabd83fdf13b51a83f0da4d4e815700d08681240091710798dc77a5876d19d0fb076eb0d69bf0f36f9e647dfe9ba536eab23b5156af6964f99d577045df32219d68649315b4d6dd15808294938f6c27ce3794257489390a633501e16303de6d6aa3f9f07ab55620d7848922fa654952ef1648d62cb576fa34672c155b3a6652f6c01208b141838de57f4c55bbc55e7cdd770638e2c59ec85dbac3eadd134ecc9edb4ee3c186cb28e35e1c69c6290b637143bcd7f1dc5faed07dfe3bd222c5b6ff44a0132794b668a996d91f9d65e68c4855ff43325acb98efa254eedc7179fdb6087910f8c32a0e7cafd0f0de8b01e7bd97530be4ec9b96a774f501b125f19f15dffe945221c4226a11d926efcb03b081e43a60a15ed353561afe87576960aa87ca819baa3c80df452119740aa14702e85ce64f0cd843aa35a63c0fb93f28222f8291c5bb989f88db9c6e3a5e775584a9dfbcc3bcaf3b8ccd993e3da5185b95d1ec2295edd50a6bddca5785db08d42d1c9428848ea23553ba790dfb8689211390eb01d3bed9e30966963f8f8c2f4279c89739e09b9b3ba343d900793d0596652267eb0b158a72b93d4fb18af3889c984d2420ba256d78e6f34d0b4d5a832e46c151a961611842176c4a982cd759f48ad0b4b35399390202bcbc38e3968d7840f48f263e838b7acc947f2fb033a4e655c430c19be51f7c53c38f0c24f3c0c3ac6e981f1954d71079a59949c3fb89182bdf71f7286f1a4c0dadb3fb38c40f1eaaee94b88445e60bd4cc08266e1c4c181ab896d402dc6adae604b9c77a96410c5cc8fe29b99dfdb7ce667923d77949ace0f0fe8ef5e36b2881b53d3102564e80b320820f8bd771c9bf8da7e67ccf0c193c1c631023376edca338456feef2f4d9cf248b54ff207f9594f21ee70c872bb01bd5cc3c6873183edc96be06755ece40dfd23d3a4fa562785133d66da3f8993d64acc68d5f945e84e5fe3f31249ed1e6074c37249b6f7b8e507b7c6005b2a3d61d5d0a37d616d812767e886ff3573dacfb5af2bd64952cb6f7820901f4b8e50a55b80ac808f41253c887685a0cd37271753103148312a0386fb1dff8c25e0f2444e01b7010e5b475e0e7a3d52bf6b14017708f851ecd2582f5a486c3989eaa8b56f0ddd7eadf018eeb8710e702df9639de2321b7dcc5f6794795d5ba96059828c9e41bfa1ea639946f336b7ad4fd7ad8c2b0ef92d117b79d92939e6410dd5a0f02976af2b0eabad51fca7c2f3dd62fb6a0f6adfeba5fb84e21c451c96a803a07c22c1aca51c77429cb3b2e2e904bbf5defae6791e7f112a11a6904e854fcb442fabf9ef0f6fed0ff35ea620412bc443f0f40cf6c7b349eba62a045b50c2d62ff029b64cba33da4df48c97967e68ed3c776f85eede6aff9d1790cbe07ec1299b7759284e3490fd0d00ad092723efa4f5a3cbd9305dd9376db810838f35d85601acea961cd39e08b973bacbd2d53557c45f596997cd13937cbd23b8fc0bc85eb4c10cc23e32e57df383fa1ed6a6a1606fb8fd6171c5b7659de135aa6d12ab7b5fc0e0ee4bd9cfc424a3cd6920aae66d944975203355ef5b6a34a087d2f666e15a6b844a81801fb53c54b468ec7281fec04eda74fff38a6f68f9127f0da4b79fe4a6f37dab0cb253a9e42db9bcc5fbb9c96c0b055d4585f8f3280445ef5a7d9f8904eee2d5d855319946657aa074ea37d67737ccf2ac868b8808cddc0ded32ed5805b6260e293ea1131f2b80024b8010722238de063fc12d339c167a085ff124eef9d4324b7510eeed67827132366aa537999a2ccc488bb782203d13e367ad837a3f7033af2aa3c285cc9b0395d822f7b675705ce0d3cb57edc12b81cb2dff73b89930fce6f93a94bbe4a6a9b7327fa32d697037998785b1ec6ba38a3d2135f206cb39a9e20107dca12558bb4b3a4ad293b3d112367c03d34a20c1cdf6468bd9b1e24a2c2241b136ba79afdeda91627ae2d1737d9c6d5277e4969c21a2765c2ab42f5bb7f3ade4a35e216b21ef3b9d1b3cc7d80efb776c19e7234288631d1f7d4567aecba747a91f3fe65fbbf33f322a2bb512e70fe654ce0bc37f4bbbae4a8a2800ede6f7015734dd85b090d0eb4f2d5867709612b424c28330644717ab4e208d95e4e48422b604c9e74ff9640c1be602e8e04d50cb873a0094f8d1f68102aed4e2938a3b3c359babe0c65e550f2cf1736f4c66fb63738f68afd1f75458ae52e7e02cbd1714ad184b7a59c2ff341b3bea281f1edb50f9d8ab4caf8728785c1a1a8691be6c298592b19974cbae2dc62a96d1a46a07bb387494b1a8e7f123914b7f7e49eee6d585bd4604eb94a22b9e4f380b4ce2f935d52df4de32ace9a2f0173cee94b1b082eb45fadfb473c743d6cce3b291cc7dab12828494ccd9339ab7fddc1db523e8ca3c91bdb58c6333498ab4c6bb88e12096a31354df6e31b25a208c95b0ff93672e9c9022bf2c6cbd3dac0ad80275ecda8271c02eef04be35888a34d34be51ba3c407cea7b1e9210d1264178d999a412a0a1ba92ccd2c3f53e1aca4eaf0cbb625a5fd2080650e9845e0b9d9260baf8536c2c7bea379bdd44b87fd84f62a965b8f390487af9430d442d468217520bf32fcd841e1b561f46121f0590a35be5a6b94eb3ee7402ebde2be921e94b3b5b25e07f8e107b3efad57325bb0416a06045494ab7dbe4130b43ec0141b48c0efda29c2b22c737e7185b7c1a29e57e8690832db34c990129b88eadf68451e80ad262e393533d8b19d69f194fc36dc971c5c73cd8588b3a7dd5017137d6d4ab0ae30eca0eb9d86b17e8282aabe223b9711e7aa23d1cc5d8d03bd49c315d4025e092d9c01baa58126bee1cee21a68613934ba6999bf25cfe19a10f4f9d2a3c7fbab5ae0930fdeeef1ea3a4d3e2d90aa7f3b644189d32a5a908c89207e860cd759fcd8da9c797408e400b1ca46906be2d913f2a7878ef6a543530a8dbf9bb455ec66c1a80fb3fc88b713db477f91f5f5b65a044355b3dc0ac8055b596e3cd75bf3150bab361b263e7b3800b364c041f277463fee9a3d938ce87a4d02665f4c24b0b66cffb7083ae66e122809966e670228ecacf13d70cb78edd73385ecddde897f0887e382d50d75dcc222b0633b835fa5126b9358bec8e5712568171f5b27ccae3c86642e06f91d6450c4413ba5c8ecc8f99c16c125a9e48b9d1325ae480e5b46e3f3e1dff8ffc13cc0b0a7ebb42c11f1f3bbdd1eecffa060da31a812b9e64b13ca013815ab41aa63ad73448eb0cf80e5b0cf42abcfa09ba47d4d6e96c8e15765081c84d72ce77e39ffbd3c7a9f12a28759903f09390a96c8106c6e07f39a44e54f00cc29f84f259448123f154acf87a1d182646d1682a339a135e959e4a9828e519b2f4e705c09d8f544ae3a1ae1c14cbecb3150343ca7a489d146941e9967fe26cc76b062fb3606a54e998a63e4434f4711fb39bc8fea7a9ee66addfe90dc22e71fa9ca7e5181dae239557645e71447d9731ccfc1bc4ea499a5e04381d036155770738b39c57bd41f7d9b73cf9c91d2b2901b0facc43b4e198e845656ed89dca3225ec8ee9928561155d4c84d9ff6c44e15cf16a988125cc4aa8f1030d2adbe1821f41252c4b03ec9ccc6a548967e68703ecebd9d5fe888b3c586c1fbfb802e159d6f2e4956521a2600f72cb80478684db24056a48a7582f74881514fa271acb5f691faafba3055a9df4e897055d4789fb89a8b4fc831bfa53c0b11b912ca33fbb215744b05738d73ee", "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"}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:00 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x156e}, 0x28) 17:02:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:02:00 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x156f}, 0x28) 17:02:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa02000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:02:00 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="fef9f6d5b772797fa9b386d236ec3bafa902e2240573d3e99e691b755ff11a102a5cee367b2aec4de49c3fabd8b631d9196c7dac9b74ccd9aced1333f3957b146e643813a5eb1aff8c862b2fed533b7696c12f01b37835174b3bf911f324cba9856436383799e04dcf3a"], 0x8) 17:02:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:00 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1570}, 0x28) 17:02:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x21fc, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000200)) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000000)={0x5, 0xcf, 0x1}) 17:02:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) 17:02:01 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) pwritev(r0, &(0x7f0000000740)=[{&(0x7f0000000000)="da2480b1ee53c51c39c18ce555cfbdd71f0d73e02c27f60512e18e0164003670a7ed23388d5d934ca93844601b6949e3ada17a3b0a29536f911125a3847bf3813be5da305f3d9f596bf674a9c6b6635279847daa0e25686ef9ae76158cec51f9088d32199d612a5169ce61dc72572d0df4de", 0x72}, {&(0x7f0000000080)="c7678b2e5ade1cd60fffe8b00e3889b3e7d5b45fa3d9a7b29e320ffeb53c2423928f58bcbb18c18c0e2363662cf65bfff367fceda539edeace9e95c0d5e1d7c821922cad66f08f4a1bbcdd7db7b10d53a09160b172cf7ca2fd9bafa61b8c550368232d55c775ddcfa24d437a1949d1e2dc9021cc600a117454919da0281aa78b1b4732e88bdd5703b8b4336eb42b3c9bcbd10f4ac2a5e87c6708945aea6524baeafe664cf4f595831ae22f9cb7c7ab7e90c6f3255e374bbc23e3f5a59f10557a4e3378a3de8b1b3d279aba5f4363", 0xce}, {&(0x7f0000000300)="d2d6a62cb07755129aa82c86adaae3fa95554f36023fb496958ac709e293aeecb35fac9caa72427d52c32516", 0x2c}, {&(0x7f0000000400)="33a630621af67409843076dd099e61f50e5f5de0742dd8825db9fc40930a584143756245a66f7513589a09a4c31e45fdedadb3245d80063277e35e6bca9a4cfd495f89e97789a699712a682cecd3ac3dc451e8e9d57d3628a80b1beb8da44b94174115fef82979e0a66201595aa25e8bf0a3d2d657a999e2437536e2e334be31d4f7a04b284e418c9e40de823d68c67f414c214b540889f278858de05cc85f2f3147e57eaffbb98e68820820e01594110e2575fd0e3e041acc943ffa07b1d89ea25b70798995a982560431c4e0ad91a3c20142cc911474d27664823978a23021e918eb5d3352bdb4e38474ccac379bfda817cf17dc1c570f716db4983aea0e", 0xff}, {&(0x7f0000000500)="c6403b9d0f7378eef9b0494e70a893804f68a67a11dd5268de175745a98b497df06f0618b15476dff5e21bc36a96e09de159ba4f352b77aa138e226e2d6b655ba6629b720cf38370ecec9ee338ae289ac9584b53fbfdc77e1e470fd8a274a5507f43c7f153452890bc2a231758336acca1b8d79fdb1813b660b7957fc5f11a485f8def1936a806a7db63d83f34b299d0e446851639102b3301b3631530e7116ef9883be453a5af550245916a1cffc091f8584d2b9db629172923ad3519fc353b7b3c72eb0ea667100f5944d994b42fc327d0839b09fe13f3a459df8739acebf4e9cea9e8182d86a9d33765b53efbf3f863ae", 0xf2}, {&(0x7f0000000600)="25bd77df5f32d1f286fc0f63c40d719f72f1a10a6c5fe6689e8198172478875a32576e9498c09ec8bfdb0b232ef3c2b838780dc7217b4df4d55d1f231d1f7e6dc3ee1e0b7b8fc5a6652b36ed185cfa04ccc001711d70b51d1a1fc508420d0eb48a45479602cfe8e26b5458fde34ebf5d802e3d5b28e670ceb0d30231f471a074b1ff24d150357c589ca8cd1248284db233b21c5a24d6db7cb39ece6cbc0ef64cad8b6412a6fe253d7e1122ba5ccf2bafaa3a9460ed871052f539fa57cf05710dfcb1cb418fe9ddfe3441d68ff081c6", 0xcf}, {&(0x7f0000000340)="2b7083c60cc1099f0712d3e50ccd511c9ef2f38e020b68abcf", 0x19}, {&(0x7f0000000700)="c528a73ff275e2c1a5067af90c3f3ed733db90b2148930ffc4e46f42d97612", 0x1f}], 0x8, 0x39) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:02:01 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1571}, 0x28) 17:02:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xd00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:01 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1572}, 0x28) 17:02:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x0) 17:02:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x0) 17:02:01 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1573}, 0x28) 17:02:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x40000000040011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:01 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='personality\x00') accept4$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) connect$rds(r1, &(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="6efd63ebb8b218da7b052bff077cfb4dc934d109763a759aac087f70c20ce50644e01c812c783ff70900000075eba4c0a3"], 0x8) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:adjtime_t:s0\x00', 0x1f, 0x1) 17:02:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x0) 17:02:01 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1574}, 0x28) 17:02:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:01 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1575}, 0x28) 17:02:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x800, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x101000) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:02:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1003000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x9, 0x8, 0x8002, 0x9, 0x3, 0x4, 0x1f, 0xffff, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={r3, @in6={{0xa, 0x4e23, 0x0, @mcast1, 0x8001}}, 0x1, 0x40}, 0x90) 17:02:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:02 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1576}, 0x28) 17:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1800000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x800, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x101000) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:02:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r0}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r1, 0x10000, 0x30, 0x7, 0x4}, &(0x7f00000000c0)=0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="9cca16db1b21f579"], 0x8) 17:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x1c02000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:02 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1577}, 0x28) 17:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:02 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1578}, 0x28) [ 2229.368931][T31834] mkiss: ax0: crc mode is auto. 17:02:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x800, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x101000) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:02:02 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000100)={{0x3, 0x2}, 'port1\x00', 0x8, 0x1, 0x9, 0x1, 0x7a, 0xbc, 0x8821, 0x0, 0x1, 0x6}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:02 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) openat$cgroup_ro(r0, &(0x7f00000000c0)='^e.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) fallocate(r1, 0x40, 0x5, 0x9) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000000)=r2, 0x4) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="feb6595dbd2ae16d656d6f72797f"], 0x8) 17:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2001000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:02 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1579}, 0x28) 17:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:03 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x157a}, 0x28) 17:02:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:03 executing program 3 (fault-call:5 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2300000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x7, 0x1c000, 0x7d, 0x4}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) [ 2229.817035][T32289] mkiss: ax0: crc mode is auto. 17:02:03 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x157b}, 0x28) 17:02:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2400000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2229.860748][T32361] FAULT_INJECTION: forcing a failure. [ 2229.860748][T32361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2229.952911][T32361] CPU: 0 PID: 32361 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #37 [ 2229.960941][T32361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2229.971015][T32361] Call Trace: [ 2229.974341][T32361] dump_stack+0x172/0x1f0 [ 2229.978707][T32361] should_fail.cold+0xa/0x15 [ 2229.983318][T32361] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2229.989230][T32361] ? ___might_sleep+0x163/0x280 [ 2229.994100][T32361] should_fail_alloc_page+0x50/0x60 [ 2229.999496][T32361] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2230.004919][T32361] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2230.010656][T32361] ? pmd_val+0x85/0x100 [ 2230.014823][T32361] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2230.021095][T32361] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2230.027353][T32361] alloc_pages_vma+0xdd/0x540 [ 2230.032061][T32361] __handle_mm_fault+0x1dd4/0x3ec0 [ 2230.037201][T32361] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2230.042762][T32361] ? find_held_lock+0x35/0x130 [ 2230.047556][T32361] ? handle_mm_fault+0x322/0xb30 [ 2230.052513][T32361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2230.058771][T32361] ? kasan_check_read+0x11/0x20 [ 2230.063637][T32361] handle_mm_fault+0x43f/0xb30 [ 2230.068505][T32361] __do_page_fault+0x5ef/0xda0 [ 2230.073294][T32361] do_page_fault+0x71/0x581 [ 2230.077851][T32361] ? page_fault+0x8/0x30 [ 2230.082273][T32361] page_fault+0x1e/0x30 [ 2230.086430][T32361] RIP: 0033:0x406d5d [ 2230.090329][T32361] Code: 0f 1f 44 00 00 c6 44 24 0e 06 48 c7 04 24 10 00 00 00 e9 56 ff ff ff e8 81 50 05 00 90 41 55 41 54 55 53 48 81 ec d8 1b 00 00 <48> 89 bc 24 08 01 00 00 48 89 b4 24 00 01 00 00 48 89 94 24 f8 00 [ 2230.109937][T32361] RSP: 002b:00007f98d09f1070 EFLAGS: 00010202 [ 2230.116189][T32361] RAX: 0000000000406d50 RBX: 00007f98d09f2c90 RCX: 0000000000000000 [ 2230.124253][T32361] RDX: 000000002000d000 RSI: 0000000000000005 RDI: 0000000000000006 [ 2230.132235][T32361] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2230.140311][T32361] R10: 0000000000000064 R11: 0000000000000000 R12: 00007f98d09f36d4 [ 2230.148388][T32361] R13: 00000000004c69bb R14: 00000000004dbf98 R15: 0000000000000007 [ 2230.166175][T32361] syz-executor.3 invoked oom-killer: gfp_mask=0x0(), order=0, oom_score_adj=1000 [ 2230.221217][T32361] CPU: 0 PID: 32361 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #37 [ 2230.229242][T32361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2230.229265][T32361] Call Trace: [ 2230.229292][T32361] dump_stack+0x172/0x1f0 [ 2230.229312][T32361] dump_header+0x10f/0xb6c [ 2230.229328][T32361] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2230.229351][T32361] ? ___ratelimit+0x60/0x595 [ 2230.242729][T32361] ? do_raw_spin_unlock+0x57/0x270 [ 2230.242753][T32361] oom_kill_process.cold+0x10/0x15 [ 2230.242769][T32361] out_of_memory+0x79a/0x1280 [ 2230.242788][T32361] ? lock_acquire+0x16f/0x3f0 [ 2230.286954][T32361] ? pagefault_out_of_memory+0xeb/0x11c [ 2230.292525][T32361] ? oom_killer_disable+0x280/0x280 [ 2230.297746][T32361] ? mutex_trylock+0x18e/0x1e0 [ 2230.302528][T32361] ? pagefault_out_of_memory+0xeb/0x11c [ 2230.308097][T32361] pagefault_out_of_memory+0x109/0x11c [ 2230.313577][T32361] ? out_of_memory+0x1280/0x1280 [ 2230.318546][T32361] ? lock_downgrade+0x880/0x880 [ 2230.323457][T32361] mm_fault_error+0x100/0x3a0 [ 2230.328161][T32361] __do_page_fault+0xc3a/0xda0 [ 2230.332962][T32361] do_page_fault+0x71/0x581 [ 2230.337513][T32361] ? page_fault+0x8/0x30 [ 2230.341782][T32361] page_fault+0x1e/0x30 [ 2230.345957][T32361] RIP: 0033:0x406d5d [ 2230.349869][T32361] Code: 0f 1f 44 00 00 c6 44 24 0e 06 48 c7 04 24 10 00 00 00 e9 56 ff ff ff e8 81 50 05 00 90 41 55 41 54 55 53 48 81 ec d8 1b 00 00 <48> 89 bc 24 08 01 00 00 48 89 b4 24 00 01 00 00 48 89 94 24 f8 00 [ 2230.369577][T32361] RSP: 002b:00007f98d09f1070 EFLAGS: 00010202 [ 2230.375832][T32361] RAX: 0000000000406d50 RBX: 00007f98d09f2c90 RCX: 0000000000000000 [ 2230.383819][T32361] RDX: 000000002000d000 RSI: 0000000000000005 RDI: 0000000000000006 [ 2230.392562][T32361] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2230.400551][T32361] R10: 0000000000000064 R11: 0000000000000000 R12: 00007f98d09f36d4 [ 2230.408549][T32361] R13: 00000000004c69bb R14: 00000000004dbf98 R15: 0000000000000007 [ 2230.424329][T32361] Mem-Info: [ 2230.431244][T32361] active_anon:225735 inactive_anon:190 isolated_anon:0 [ 2230.431244][T32361] active_file:13474 inactive_file:43843 isolated_file:0 [ 2230.431244][T32361] unevictable:0 dirty:486 writeback:0 unstable:0 [ 2230.431244][T32361] slab_reclaimable:20955 slab_unreclaimable:106841 [ 2230.431244][T32361] mapped:58779 shmem:245 pagetables:4239 bounce:0 [ 2230.431244][T32361] free:1107856 free_pcp:656 free_cma:0 [ 2230.514797][T32361] Node 0 active_anon:900780kB inactive_anon:760kB active_file:53760kB inactive_file:175428kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235116kB dirty:2012kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 346112kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 17:02:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x800000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket(0x13, 0xf, 0x80000001) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'ipddp0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="1100000031eeb35959d723467ce66f3d33004ad347eb36c569b878cd0c9902c221c21cc68fb79eb1504f74679b4f7e9445df9ce91e4af681637a408f72ce5d4dd8fc27b83743a4ca1c716cef75db81bf7e99338caffffc2b4a76511862fb17ba3ae04a9ccc5a48dc9b91000000000008000000000000000000"]}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x2, 0x0, 0x9, 0x800, 0x8]}, 0xe) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x802, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0xa0) write$P9_RLCREATE(r5, &(0x7f0000000200)={0x18, 0xf, 0x2, {{0x2, 0x4, 0x2}, 0xffffffff}}, 0x18) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:03 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x157c}, 0x28) 17:02:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2403000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x80000005}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) accept4$netrom(r2, &(0x7f0000000000)={{0x3, @null}, [@null, @default, @netrom, @netrom, @rose, @default, @null, @rose]}, &(0x7f0000000080)=0x48, 0x800) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000100)=0x1, 0x4) [ 2230.545196][T32361] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2230.572286][T32361] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2230.685128][T32361] lowmem_reserve[]: 0 2553 2555 2555 17:02:04 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x157d}, 0x28) [ 2230.704972][T32361] Node 0 DMA32 free:628080kB min:36232kB low:45288kB high:54344kB active_anon:907192kB inactive_anon:760kB active_file:53760kB inactive_file:175428kB unevictable:0kB writepending:2012kB present:3129332kB managed:2617996kB mlocked:0kB kernel_stack:11328kB pagetables:17084kB bounce:0kB free_pcp:1536kB local_pcp:584kB free_cma:0kB [ 2230.750622][T32516] mkiss: ax0: crc mode is auto. 17:02:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2600000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2230.834865][T32361] lowmem_reserve[]: 0 0 2 2 [ 2230.839550][T32361] Node 0 Normal free:12kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2230.930485][T32361] lowmem_reserve[]: 0 0 0 0 [ 2230.941493][T32361] Node 1 Normal free:3782300kB min:53624kB low:67028kB high:80432kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2230.978967][T32361] lowmem_reserve[]: 0 0 0 0 [ 2230.983821][T32361] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 2231.068250][T32361] Node 0 DMA32: 40*4kB (UE) 344*8kB (U) 271*16kB (UE) 275*32kB (UE) 282*64kB (UE) 5*128kB (UME) 1*256kB (M) 0*512kB 2*1024kB (UE) 4*2048kB (ME) 144*4096kB (UM) = 635056kB [ 2231.164234][T32361] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2231.187936][T32361] Node 1 Normal: 63*4kB (UM) 234*8kB (UE) 245*16kB (UE) 64*32kB (UME) 16*64kB (UME) 10*128kB (UE) 8*256kB (UME) 5*512kB (UM) 3*1024kB (ME) 0*2048kB 919*4096kB (M) = 3782300kB [ 2231.244394][T32361] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2231.275106][T32361] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2231.324261][T32361] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2231.364375][T32361] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2231.384257][T32361] 57579 total pagecache pages [ 2231.389094][T32361] 0 pages in swap cache [ 2231.404244][T32361] Swap cache stats: add 0, delete 0, find 0/0 [ 2231.410499][T32361] Free swap = 0kB [ 2231.424256][T32361] Total swap = 0kB [ 2231.428104][T32361] 1965979 pages RAM [ 2231.432125][T32361] 0 pages HighMem/MovableOnly [ 2231.444228][T32361] 339406 pages reserved [ 2231.454611][T32361] 0 pages cma reserved [ 2231.458800][T32361] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,global_oom,task_memcg=/syz3,task=syz-executor.3,pid=18920,uid=0 [ 2231.497115][T32361] Out of memory: Killed process 18920 (syz-executor.3) total-vm:72712kB, anon-rss:6304kB, file-rss:35884kB, shmem-rss:0kB 17:02:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:04 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x40000000000011) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000)=0xae, 0x4) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x2601000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:04 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x157e}, 0x28) 17:02:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:04 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="6d656d6f72797f006caeb9d1b5219aab604ad1caf43817425de0c4152e6d6f57e7d332bd28624ee0daeabfe109e7b889bc2736c4d459a142"], 0x8) 17:02:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x3c00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2231.781859][T32740] mkiss: ax0: crc mode is auto. 17:02:05 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x157f}, 0x28) 17:02:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0x0) 17:02:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:05 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1580}, 0x28) 17:02:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000040)=0x9) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syzkaller0\x00', 0x10) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:02:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x202000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x100) getpeername$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) clock_getres(0x5, &(0x7f00000000c0)) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) ioctl$CAPI_MANUFACTURER_CMD(r4, 0xc0104320, &(0x7f0000000180)={0x0, &(0x7f0000000200)="814ff081c4fdbce855548d79b5934c47e28b18106b919b89ed2b13c03a22cbeddabd22ebaa104d3ea0cecc1a41e4d873d7b1afc2f1f00842f737a3f2fa0acc83f40f205bd86811ef15881c36225ef482d132ac3c9470337200fcfbb43892054c9c854b39d64f9d8258e0b7db4fd86bdd57ae33995707b35f57fb366797919c3dce04a46ab9ad"}) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2232.310294][ T692] mkiss: ax0: crc mode is auto. 17:02:05 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1581}, 0x28) 17:02:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x3, 0x0, 0x0, 0x0) 17:02:05 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000800000000002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) read(r3, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000080)={0x200000000bf, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0x404c534a, &(0x7f0000000100)) r4 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x1000000000013) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="fe6d656d6f72797f"], 0x8) 17:02:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4253465800000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:05 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1582}, 0x28) 17:02:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4602000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x4, 0x0, 0x0, 0x0) 17:02:06 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1583}, 0x28) 17:02:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3f, 0x80200) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0000010000000000"], 0x8) [ 2232.764497][ T1241] mkiss: ax0: crc mode is auto. 17:02:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:06 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1584}, 0x28) 17:02:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4801000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:06 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1585}, 0x28) 17:02:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x5, 0x0, 0x0, 0x0) 17:02:06 executing program 2 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:06 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1586}, 0x28) 17:02:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2233.381214][ T1744] FAULT_INJECTION: forcing a failure. [ 2233.381214][ T1744] name failslab, interval 1, probability 0, space 0, times 0 [ 2233.465100][ T1744] CPU: 1 PID: 1744 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 2233.473024][ T1744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2233.473046][ T1744] Call Trace: [ 2233.486415][ T1744] dump_stack+0x172/0x1f0 [ 2233.490755][ T1744] should_fail.cold+0xa/0x15 [ 2233.495357][ T1744] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2233.501201][ T1744] ? ___might_sleep+0x163/0x280 [ 2233.506088][ T1744] __should_failslab+0x121/0x190 [ 2233.506108][ T1744] should_failslab+0x9/0x14 [ 2233.506124][ T1744] kmem_cache_alloc_trace+0x2d1/0x760 [ 2233.506137][ T1744] ? _parse_integer+0x139/0x190 [ 2233.506163][ T1744] alloc_pipe_info+0xb9/0x430 [ 2233.506182][ T1744] splice_direct_to_actor+0x775/0x970 [ 2233.506199][ T1744] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2233.506216][ T1744] ? lock_downgrade+0x880/0x880 [ 2233.506231][ T1744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2233.506255][ T1744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2233.521048][ T1744] ? do_splice_to+0x190/0x190 [ 2233.521071][ T1744] ? rw_verify_area+0x118/0x360 [ 2233.521091][ T1744] do_splice_direct+0x1da/0x2a0 [ 2233.530616][ T1744] ? splice_direct_to_actor+0x970/0x970 [ 2233.530644][ T1744] ? rw_verify_area+0x118/0x360 [ 2233.530664][ T1744] do_sendfile+0x597/0xd00 [ 2233.552667][ T1744] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2233.552691][ T1744] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2233.599592][ T1744] ? fput+0x1b/0x20 [ 2233.603423][ T1744] __x64_sys_sendfile64+0x1dd/0x220 [ 2233.608659][ T1744] ? __ia32_sys_sendfile+0x230/0x230 [ 2233.613958][ T1744] ? do_syscall_64+0x26/0x610 [ 2233.618647][ T1744] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2233.623941][ T1744] ? trace_hardirqs_on+0x67/0x230 [ 2233.628982][ T1744] do_syscall_64+0x103/0x610 [ 2233.629008][ T1744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2233.639494][ T1744] RIP: 0033:0x458209 [ 2233.643494][ T1744] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2233.663110][ T1744] RSP: 002b:00007f7708a8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2233.671535][ T1744] RAX: ffffffffffffffda RBX: 00007f7708a8ac90 RCX: 0000000000458209 [ 2233.679519][ T1744] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2233.687490][ T1744] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2233.687500][ T1744] R10: 0010000000000443 R11: 0000000000000246 R12: 00007f7708a8b6d4 [ 2233.687507][ T1744] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000006 17:02:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000040)=0xf000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:07 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1587}, 0x28) 17:02:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4f00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:07 executing program 2 (fault-call:5 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x6, 0x0, 0x0, 0x0) [ 2233.831791][ T1912] FAULT_INJECTION: forcing a failure. [ 2233.831791][ T1912] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2233.845063][ T1912] CPU: 0 PID: 1912 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 2233.852969][ T1912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2233.863237][ T1912] Call Trace: [ 2233.866554][ T1912] dump_stack+0x172/0x1f0 [ 2233.870906][ T1912] should_fail.cold+0xa/0x15 [ 2233.870944][ T1912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2233.881421][ T1912] ? percpu_ref_tryget_live+0xef/0x290 [ 2233.886922][ T1912] should_fail_alloc_page+0x50/0x60 [ 2233.892303][ T1912] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2233.897689][ T1912] ? find_held_lock+0x35/0x130 [ 2233.902470][ T1912] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2233.902507][ T1912] cache_grow_begin+0x9c/0x860 [ 2233.902531][ T1912] ? alloc_pipe_info+0xb9/0x430 [ 2233.917857][ T1912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2233.917882][ T1912] kmem_cache_alloc_trace+0x67f/0x760 [ 2233.917896][ T1912] ? _parse_integer+0x139/0x190 [ 2233.917922][ T1912] alloc_pipe_info+0xb9/0x430 [ 2233.934418][ T1912] splice_direct_to_actor+0x775/0x970 [ 2233.934439][ T1912] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2233.934464][ T1912] ? lock_downgrade+0x880/0x880 [ 2233.934480][ T1912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2233.934495][ T1912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2233.934515][ T1912] ? do_splice_to+0x190/0x190 [ 2233.972251][ T1912] ? rw_verify_area+0x118/0x360 [ 2233.977125][ T1912] do_splice_direct+0x1da/0x2a0 [ 2233.981998][ T1912] ? splice_direct_to_actor+0x970/0x970 [ 2233.987574][ T1912] ? rw_verify_area+0x118/0x360 [ 2233.992527][ T1912] do_sendfile+0x597/0xd00 [ 2233.992557][ T1912] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2233.992577][ T1912] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2233.992595][ T1912] ? fput+0x1b/0x20 [ 2234.012401][ T1912] __x64_sys_sendfile64+0x1dd/0x220 [ 2234.017618][ T1912] ? __ia32_sys_sendfile+0x230/0x230 [ 2234.017637][ T1912] ? do_syscall_64+0x26/0x610 [ 2234.017654][ T1912] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2234.017678][ T1912] ? trace_hardirqs_on+0x67/0x230 [ 2234.038016][ T1912] do_syscall_64+0x103/0x610 [ 2234.042627][ T1912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2234.048531][ T1912] RIP: 0033:0x458209 [ 2234.052436][ T1912] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2234.072088][ T1912] RSP: 002b:00007f7708a8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:02:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x4fe076ce7b010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x5200000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6000000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2234.080529][ T1912] RAX: ffffffffffffffda RBX: 00007f7708a8ac90 RCX: 0000000000458209 [ 2234.088520][ T1912] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2234.096520][ T1912] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2234.096530][ T1912] R10: 0010000000000443 R11: 0000000000000246 R12: 00007f7708a8b6d4 [ 2234.096538][ T1912] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000006 17:02:07 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1588}, 0x28) 17:02:07 executing program 2 (fault-call:5 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7fff, 0x400000) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x4, 0x3}, 0x10) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6203000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:07 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1589}, 0x28) [ 2234.324813][ T2234] FAULT_INJECTION: forcing a failure. [ 2234.324813][ T2234] name failslab, interval 1, probability 0, space 0, times 0 [ 2234.375284][ T2234] CPU: 1 PID: 2234 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 2234.383228][ T2234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2234.383248][ T2234] Call Trace: [ 2234.397556][ T2234] dump_stack+0x172/0x1f0 [ 2234.401916][ T2234] should_fail.cold+0xa/0x15 [ 2234.406529][ T2234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2234.412356][ T2234] ? ___might_sleep+0x163/0x280 [ 2234.412377][ T2234] __should_failslab+0x121/0x190 [ 2234.412408][ T2234] should_failslab+0x9/0x14 [ 2234.412433][ T2234] kmem_cache_alloc_node_trace+0x270/0x720 [ 2234.432547][ T2234] ? lock_downgrade+0x880/0x880 [ 2234.437428][ T2234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2234.443699][ T2234] __kmalloc_node+0x3d/0x70 [ 2234.448232][ T2234] kvmalloc_node+0x68/0x100 [ 2234.452748][ T2234] iov_iter_get_pages_alloc+0x862/0x1350 [ 2234.452767][ T2234] ? unwind_get_return_address+0x61/0xa0 [ 2234.452792][ T2234] ? __save_stack_trace+0x99/0x100 [ 2234.469483][ T2234] ? iov_iter_revert+0xaa0/0xaa0 [ 2234.474445][ T2234] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2234.480176][ T2234] ? iov_iter_pipe+0xba/0x2f0 [ 2234.480200][ T2234] default_file_splice_read+0x199/0x890 [ 2234.480229][ T2234] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2234.496303][ T2234] ? kasan_kmalloc+0x9/0x10 [ 2234.500828][ T2234] ? __kmalloc+0x15c/0x740 [ 2234.505279][ T2234] ? alloc_pipe_info+0x199/0x430 [ 2234.510244][ T2234] ? do_sendfile+0x597/0xd00 [ 2234.514860][ T2234] ? do_syscall_64+0x103/0x610 [ 2234.519637][ T2234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2234.525727][ T2234] ? __lock_acquire+0x548/0x3fb0 [ 2234.530698][ T2234] ? iter_file_splice_write+0xbe0/0xbe0 [ 2234.536290][ T2234] ? percpu_ref_put_many+0x94/0x190 [ 2234.541508][ T2234] ? percpu_ref_put_many+0x94/0x190 [ 2234.546811][ T2234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2234.553073][ T2234] ? fsnotify+0x811/0xbc0 [ 2234.557429][ T2234] ? fsnotify+0xbc0/0xbc0 [ 2234.561779][ T2234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2234.568046][ T2234] ? fsnotify_first_mark+0x210/0x210 [ 2234.573361][ T2234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2234.579698][ T2234] ? security_file_permission+0x94/0x380 [ 2234.585637][ T2234] ? iter_file_splice_write+0xbe0/0xbe0 [ 2234.591238][ T2234] do_splice_to+0x12a/0x190 [ 2234.595763][ T2234] splice_direct_to_actor+0x2d2/0x970 [ 2234.601156][ T2234] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2234.606729][ T2234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2234.612996][ T2234] ? do_splice_to+0x190/0x190 [ 2234.617712][ T2234] ? rw_verify_area+0x118/0x360 [ 2234.622590][ T2234] do_splice_direct+0x1da/0x2a0 [ 2234.622609][ T2234] ? splice_direct_to_actor+0x970/0x970 [ 2234.622633][ T2234] ? rw_verify_area+0x118/0x360 [ 2234.637891][ T2234] do_sendfile+0x597/0xd00 [ 2234.642440][ T2234] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2234.642460][ T2234] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2234.642478][ T2234] ? fput+0x1b/0x20 [ 2234.657906][ T2234] __x64_sys_sendfile64+0x1dd/0x220 [ 2234.663146][ T2234] ? __ia32_sys_sendfile+0x230/0x230 [ 2234.668445][ T2234] ? do_syscall_64+0x26/0x610 [ 2234.673136][ T2234] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2234.678443][ T2234] ? trace_hardirqs_on+0x67/0x230 [ 2234.683485][ T2234] do_syscall_64+0x103/0x610 [ 2234.688102][ T2234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2234.694005][ T2234] RIP: 0033:0x458209 [ 2234.697917][ T2234] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2234.717541][ T2234] RSP: 002b:00007f7708a8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:02:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x7, 0x0, 0x0, 0x0) 17:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6402000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2234.726003][ T2234] RAX: ffffffffffffffda RBX: 00007f7708a8ac90 RCX: 0000000000458209 [ 2234.733993][ T2234] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2234.741986][ T2234] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2234.749976][ T2234] R10: 0010000000000443 R11: 0000000000000246 R12: 00007f7708a8b6d4 [ 2234.757975][ T2234] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000006 17:02:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) write$FUSE_STATFS(r3, &(0x7f00000014c0)={0x60, 0xfffffffffffffffe, 0x1, {{0xfffffffffffffc89, 0x8000, 0x4af, 0x1, 0x5, 0x7f, 0x1, 0x1f}}}, 0x60) poll(&(0x7f0000001540)=[{r1, 0x8}], 0x1, 0x3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x7, &(0x7f00000013c0)=[{&(0x7f0000000100)="a417689d0fb77b7bcb335ddf7d1eb9f7218c2e967b83f03a6bd22981", 0x1c, 0x10000}, {&(0x7f0000000200)="dd1a0f48cee18ccc0befb7d8fa888e17ff3eda696bc18d09c9f3fff469d5c2b2baf546b42031db8305ad6155b96e0cd12e610b6af883dfa33658924a0351d2939187476b3ef00b9d6c3189a6369317685101dfff06696fc1e63c5f677d2bb9e40840c271d592c7e9430386bdd8383ff284ccea5de385d5b13fd8fa069fe31bc3d44cbb6a6807323b68c4c0240cd5263375c220c799b1fb2c26b6b7d94b8c846ddd1bc00ceb73dbf6b97af3e83dae16871652a2f445c5fc2a2f04b2b844219600b9", 0xc1, 0xfffffffffffffff8}, {&(0x7f0000000140)="69fd3b8902aac29e092c89d23d0ec299b4c8743a38461d99", 0x18, 0x800}, {&(0x7f0000000180)="218ad1d476", 0x5, 0x1000}, {&(0x7f0000000300)="b847d5485351b418ca7371ff688e11d6c878a7f8eb63b4dd4cf52a7bd9696b7af71faff2fbc57569d5212a8579b9002ed7950e40d94149996369b737a42873d2bba9a05c6085f100e04ebde4d20a72f52c528fb4a9f8d3a3c53ec3dcdb72620c9967e5c1", 0x64, 0x6}, {&(0x7f0000000380)="b64ea4ecc7a19e17ae40e80811923bd91a7988f21fe4796a1e4f75750ef72837a40b5aa793649af722fce7f6bdcfa25ff61d2efa69aa1fcaaf69", 0x3a, 0x6}, {&(0x7f00000003c0)="246724641bdaec0113ac051128247c7798dccb6da4a6b03f4cc1d1846e984d66565c73af992ee5d29bc777dda0c3be8dfcfab45df924908a3a27fc4f626876b4f47435a2b0181f08d7f15028fb1995b6328c5bb1746543aee06dcfb68b6714bb0cf8accba26c3efe3387da580d2653c839efb892037d28e3ca453fb25e895e8b5bd39f59e6b77950ca07afad3a13a7917019790e2bf33a26a976510115df35eb9584a6928cb2ca2c8bf70175f01bba8f0d537e5d226faaa621a5b9b1bdd58691be673e6efb5140df49c754dff2c706a677dcadb5bba1938184029ac207d9f0fa4c550bf8cd46cf248d5b47a36f02932f27ebfeddecf6e5fa74ce7a8845170e9ee629cb669a33c5004280617ca003881cc493280ba07a42692ccd900e51eb96510a60c50e702b6489778cb4555058f630ec2b0eb388943485b6b68a4b295b2d26952e361d22b9489d60615b7211822f1066f0a15c5867f16a945c5f2e44bc25812a0d82152c684d815cf6f5e6082e5c5a810823dccf54248220c9889307c0af5abb8d10d1fb00b9b1e57508debb8a1231c96995390eae2bb388102548466554d64692b87a134d7e0bfa1f8a68fd0dad7c7975e85fd961fb1d7e400fcce9621a231d1f2a47d5c9689509d68205a6e85060fb2ae1358eab443ba5bf3029011d4c8060780a854bcae26cc2cd9cfd2cbe119522bf28c7a16da32fa97f5c28f22ce6653999e02a307bab8ff2487240c709f3e910493565ce7ff5fe3d23344f1adbb9d7c1b05bcaaab829825235de23492b0610dafc80aa88db4ab3ffed9aab7d87fc028a93bf724e7fb7306cad745aee89514b559097e03cec68b2978b007ffb27dd53788a55bc36456904179a6d8853c133be5df57a27bbdca799432d7a647f5694b2b7f5b8bd0ab527c04997a72856c54eab546feb09f58c8bf3d9e2c46a46323f07a5fe0c46512db702a5d9392161dc1b8662a2432cdf56fb5e79cad615cf12c9b97526408bcb17602ea558981cf33c2a5412d6b12dc5fdad33da4988e08e0574ab339b83c8ed08fb0e43546d6a3da8afbd9ada86367886f08be214cfb1dc61aaa619c951b4796c9a2e26abf44c44adbcf4b9b8f6029adb21cd34acf92f154e9bb1514fb831b70f5f3fc592022717218231b46f66176b3d39ad84ecf8e5fc3a255265e6f44df057ffd70f46900aae10b624ed8971ac69347a2bfee635ba71fd27387421f7321402edab33f808a1828444a1e7a096f53778ae96d2a7a8bf73e9123d1e2304eb5320661e26f782cabc758681dec5a940513e3ade76d3e3d08484ece4d98b8d0dc23e2aeb553454d6ed7643a5f8465b64ae43984b5e04087ddd875d4694e5b770952cd857556eb1de442c6d4ac2980210e0f09980f72dec9fdda296e6e223a8ad2e7eae93a8e327446ba1373d15c9d4917718bc831f699db4cf917ef54f52549a83f791ebab6c7cccbf8ade241b02282b167589196e3577ddaf5fd0d913e300cccc02712ba3b6b19f1865ae96db338446dcfc4b04fef5bb034564a1e3aabff4b2e24da9fc7b21ea24a40dd048128ead96ba9486a9576b6f83379576f0bdcdb4a22714c36d737027fdc365e63881a986c6b109002bce6848237c3c5c0552436b40ad60fa01cbb0caf2eb7af9ed3a9fcd8dc79dd3650cc0a3ff51b97811149e38f7c0096fa68beb2ed25ad5d04175716bc9fa2bf0c17755b350fdcacabb304d0391a91748afe6cc8c5b3e1146bb3b0f0c734c3cc61b84cfd23035d9de243f7a560dc507b0e3189f5543652b4deb55cd2c9d3ab97288756d4d6e76aaa9dd3b211026be2e1b615d588aff90eb18e197937f34f17e560bb681824cde8943534a5c8df44276a32e7207526a19dab4e2b0c511c5ca79354c742b9740a58c11e2315ffb714ed80b8e586c60f8abf4213bbd31f56d38d2d98b104ad3c7864fb4ea126442270255c2ad544bb7b330f38930a9b4d04e7d48e2f7196ca03c4b5e17378739db3ed51049c5bdd08f5f44ff6e1074b95bd77de70d7fedc396c72d10cd5fd32fecbee4c775e2ac9ccb511008de659a864aa12b3a346e8dc1a59fcf810e44626ca37fcce8d624ba80f636d5416cb15cc6433a0a58ad1a578f8c0044514f65de40fa5f93b25bec13069a8fa6bb5abceae8bba84c00e527b7fc70d9c851102776e3dbefdc64a5c7bcca433be5b94fa1249786be6a577a7a6565d56887ee31adc64f031460c9d6ab796760c6784cd305ec4d6c6de5dcf79b5c5ea62f0cb0c0960659733f44790dde2f9c6f02e1dcc926ac05f0728a0a5c2af8f6202f8a2ae9708e11cb7865cabe84f88d1693516473d0ed3a8f599c8c6e31e2cc29671200cd9c14a9809d50ee7385aeca0cb9a2faf4f36a0b80b73a201548bb79d4d5c3e6e218d0696b3d2526e389a1d8e73ad5fd59e0ed80c5a7526b71cc4d1b2002e687f99b334e2871b6efa7a7dfb4be6805b6b990eee9325589cc13a58c02a373733147bff5c706f19a055978cb2281777b3e3e8904abcdc2fd671867adb606ec491ecc6f5a22e07bb1bba77113e5cecaaf98928598e2add51bcd251d1c701a4106af7480ef272830d6b2076047f2c01479cda96dbcd3c34f5127e45a7a4c9795a056711380425b327596bf0f3ab1a20b5a5a9c166433f6adf9b601824c7d0ae6ac8ab90548bc2cafa1a66cb98282f5b01ba30b81030d45bcf7bbd574067bdaf51c94b7be2c7b2fd2cf3fbbe03835364341c6e37e62256f4a17863ae8b1460ab146b3dc2652667dcf9045af6eb41b7180c9e4229f49c5d7a410feb2f4d374a06e8a89e86b4430a8c8fc1519c51805ce51f66fb8a350039da6b998e6c0147ff10ac71cee41cac9270865d391d1761c61e872e142bb78509f84d8a884473c61e9ae88489e11b9f06ab289734ac404780717f4278367f5a4c40cb6e5293433b8859e4cbeddf4f13b6279bef1f1e09d13a6ef827360d0463262328883cd5eefd3f30565c83287aeb7335602ad14f86115dc3d51fa135bfc3ceaa7335bbe770baa8b6a5c6a8112f93f22d3129f7dbd4d90b8ef9ffc2cdd9cce7a96061b21d21f58ea7c9f4c50d2d00722a686cd664fdc66425242ef9aa40b99e915afc6db173fdf6443f3025ce9d7d565b3c424656a842048ec8e0fda892c42d808daec6fa764d44bfcaab355b0b1153e3c6ece83ab82ea07f1d2fd5ad5a6d48945546b46fc92416de051c30ccc4cd0a0ee952d1e958b21399304bc0f584d4a8162287b1b4d4a4af225ce55fa1225e48dc4abbc31261f239cbface1288b927f97bc1efb4098df257bee9feec3b6b61e167afb5d8d08e9f2218a55064ecbde2490ec45d1977ee241861a21c93255984d24fd37e2fc9981714a6f44a45236337b7931be1b15c2ae6801255b1d696d7edcb89b62dacdd15cda743b03efef19f4a6153da038bc9a2d68d1be9e147c1c05c5fe51490e7c68c4df6c644948ba0ca5945774ce6b28e19c73fce2a9b3021ae666cc5eab6fd615c9e1eabe9d8f18c01dce825f69c5a7b1e78f07f5774815224558f279af46a5f22a5a85669fb63559bef7d236f7444389275ce023868abb8650d6a759850f4b7e31c884afa635416ef2bc1bb774d015cfdb96d27f47e1e261becb1a11a8d8e9d068bccabb0af0f544d7fc889dc35eb0059ac0912749944d6dbc3b4794d137c0599ead76715d579113ba53c5d013e21ea288dafce9a643471895062df6bfd7a20d9b4429f9fb6385aba537d1fca5bc2938fb6b1fd2b7e2b50b269d2e03a409df1a3ab580f64ddf855e1242e86e818c0f008ae279c0f9e0e3e155571fd32f92185aadd4585431ffe5c34f67f887d4176c6b3bb8e5d22c7bd068c3d9eb5922e26389f678b14ddcbd0eff56d00effba6ae6e2bf544c47291fa212003fa195fee782f4419f7fa6f2a426b2f1c0eff995d018c44a15d724b3f0890660e09e58035e931ff069af2213212ec71f39eb562060278b5e950c78b1031f1944576fdfdbda3a9af02482608f216a0ea497d3f4fd18804da4b3b8756f5fa0a6591639f76b460932efa2b16424a369f44246809cff1833529b0c8ec8356a24dee45b415afd3177a9c3c26e00a5b69b946317685671da24ec588d69f74ef675ab8f33fc7cb9d7e2495c972accb4e06e488abe594cfee5a2bf3fb6a41fe410963b7d28bde4cb0f94f9f2ac6ccec748abc206e54365a5c711fa9b33ee791e64557e1073653069d1b0eedd862729767eb203e43d0aa97537a411f2f79e0d6b462b8ddb0e6c70da873b42bc34904f36193897b8157d42cdba81b05c135d1ebb6fc02b77ef1138071138dda4b779206d6dfd2e9ab7556cc32c403092ec4c59d5163c142eec9797c5f675f06c4854a907cac43ce7c6b7d9a5838b2129f719f9a9a443af679611823ba30aaaa72a19582ca5b95e9e2b4c313bafd0318fcfc638eee029b9caeaa005ac4b97641b1fbb35fd77d9169a0013b62a1300533f9641b5e188185a5f7d28112e5aaa8ca9234974e7433a4da717d0bfdb6adc7d09eebe7360014e2b83d1522b84bf3e406db62702767623508f42f8d1c6e9b11dd4ee9613110e6041c833dc023c47d5ac3fc42deadda40ffbb6e2700aec920aab59fd58df0c2c89d8a01241afb35552dfc772eeebecf0a53dcfc47dedfcea87c62435f58a2f1afb8deed8e8add4e5142e85b5688f1da0320f936f76e650747d74968a89a59c3dd5c1088511774f26b636a844392916e41593e53ceb5201abd83545b8907dc8aadcc47b885cb5c12877cdc0a89d0c9ecf573470568fa653536855bf7e4fcd49b5ab193f3c83508fcfcec09b3ef1d9591da849f2b640c065d3d6f5f927986d381c901d6e0adfef9064adf077c2f7d0d74b96bcf233722629aea84f406198b9d388ea9464e10e3c05e59ccb20bb52e317caf69171046d5144b712d94dfc7e5d6c9a5407acd09cf6023d9374df43ef3bc9ada2c358318a4ddd61342d3aa9bb7be1524f9e2eb25f29e2cfdb664383c90dc07a751397fa5f3f94551592956b91d3fb822c22668da848fc91e379739104bcd2dbdd0173313d8e74e5e0b062732e86f3721e4383f8a0dfb800625afbbdb400244f40b9fe122f86aef438a82e4651a46f4171f0a151adc6d93dee9569d508c797014195d9f9cb297042d8d4e11ec6597b5eface24828f97b88c310c0c389fbc3a46e446d194a9477dcfff60ace797c7f09531d7368a4d06b7dac3423e4dd1a037fc5877e425e485721c85d6e891bca0751bfbfe5303b6adc93359507a5abac55e8de789c0b01249ebd5162c9be6f341c44183c07b12091a9cdb1c2ef908317bd446b1ef08bf86c7090391d30a21f8d0c4e20702418042b8a888edde51831da3bf1ba0f7b6ff713a93be4de55502f72a0f0ea5f8e5e926e4ffd3968248bd6d08491fd3bb645f5e6e32aeafb76809a415ca331ca53550337ad5499220748f5e0b2a036ed425f3038d72c2abbb57539dc02dae27e1cc40c1e2dc01d4ff1b1c313d95147f41b51f3fa9b0610313cb5e6037e2928f2f6dc2a79f0f85715d8949aee4f9ae6e8e3e9b68df0b3500c79696de3cf90f07eccbe20cf96d3306a7a5e610aeac0528171321dd4eb2900f08fbcecb9a4a14c0d40040dba5ade9ea467f869d5a6fcc506c54e2aa0900328918cec927047a0aa626c64301a219ba96b16a8dc04d5e6c8a7676bcd26eed73d016559175699865631ffae7ae172cb7f4089501f1d01c5a9efa35b3a76b6751d82e40e93df12caab004d8c43c771f308a6da0a8e50ef405a017fd533b6a9c11ade37fc61bdaa39e277f", 0x1000, 0xc6c}], 0x440, &(0x7f00000016c0)=ANY=[@ANYBLOB="73686f72746e616d653d6c6f7765722c6e6f6e756d7461816c3d302c00de0396629c8ba99acecb694ce785becb6545df19b9699b74eee47a6295323e95516e85614a5e5077bb6f8b7e72181b43990254b0e39043c001c4c28a49b0b50e632732ad66f0dd4745de6d2033b28edc9a52a267eb1859f1fdeb60a152883370b5ea0e284d355c255394e9a94d78c61b29066dd846b83fa6ecb042f020548e2f3e13c95f643d992daff3280950ca7037f519784699c9e8c850e6d4ca5bff71589cf8bfb0a4a9337ef0364a6f6ce09b107f2ace74db28d9b5394c937e9b452ecc0100000001000000e5652f64ca53942526661810aa6330c4faa5c5ec17e58a6bede38b28e64f220bc3b1b31b9546c0dd46bcc2a6f751203321946d60abe9a96b97178fb4f0d83e3b78f52bba175c756b78d159e347141329d8c727f8d91057c3859796f9952b30ab7f71524a1c5ac769f9b278c037ac11333b85add4a8f561a328d9c029a9b101b50ca857e2df12f9b4b78c28e2e3e7c7b313e24816daef3dd7fc755b4b16ce9538611ada5584748817ec2af51659462f2fa1c34463efc4a5ea9d84df9871f728b28dd8007512a3414df4e3cb552f0951e5a62bf3060c04491dd870dee12e16d427d6453e750cf898fbe56cac91d7b2f3a243b458d873130a9d9b8f78600d79469ac5b8a7535ca43b8af1a40031dde4d9db6e7022744661749c026fc83c0d7a67"]) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:02:08 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x158a}, 0x28) 17:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2234.951125][ T2346] FAT-fs (loop5): Unrecognized mount option "nonumtal=0" or missing value 17:02:08 executing program 2 (fault-call:5 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x9, 0x0, 0x0, 0x0) 17:02:08 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x158b}, 0x28) 17:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x7000000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x7200000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xfffffffffffffffe, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:08 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x158c}, 0x28) 17:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2235.328421][ T2596] FAULT_INJECTION: forcing a failure. [ 2235.328421][ T2596] name failslab, interval 1, probability 0, space 0, times 0 17:02:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2235.369516][ T2596] CPU: 1 PID: 2596 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 2235.377462][ T2596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2235.388054][ T2596] Call Trace: [ 2235.388089][ T2596] dump_stack+0x172/0x1f0 [ 2235.388115][ T2596] should_fail.cold+0xa/0x15 [ 2235.388136][ T2596] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2235.388158][ T2596] ? ___might_sleep+0x163/0x280 [ 2235.388183][ T2596] __should_failslab+0x121/0x190 [ 2235.388216][ T2596] should_failslab+0x9/0x14 [ 2235.420692][ T2596] kmem_cache_alloc_node_trace+0x270/0x720 [ 2235.426518][ T2596] ? lock_downgrade+0x880/0x880 [ 2235.431392][ T2596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2235.437663][ T2596] __kmalloc_node+0x3d/0x70 [ 2235.442189][ T2596] kvmalloc_node+0x68/0x100 [ 2235.446707][ T2596] iov_iter_get_pages_alloc+0x862/0x1350 [ 2235.452460][ T2596] ? unwind_get_return_address+0x61/0xa0 [ 2235.458108][ T2596] ? __save_stack_trace+0x99/0x100 [ 2235.463232][ T2596] ? iov_iter_revert+0xaa0/0xaa0 [ 2235.468185][ T2596] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2235.473911][ T2596] ? iov_iter_pipe+0xba/0x2f0 [ 2235.478609][ T2596] default_file_splice_read+0x199/0x890 [ 2235.484168][ T2596] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2235.490000][ T2596] ? kasan_kmalloc+0x9/0x10 [ 2235.494514][ T2596] ? __kmalloc+0x15c/0x740 [ 2235.498980][ T2596] ? alloc_pipe_info+0x199/0x430 [ 2235.504026][ T2596] ? do_sendfile+0x597/0xd00 [ 2235.508626][ T2596] ? do_syscall_64+0x103/0x610 [ 2235.513405][ T2596] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2235.519492][ T2596] ? __lock_acquire+0x548/0x3fb0 [ 2235.524443][ T2596] ? iter_file_splice_write+0xbe0/0xbe0 [ 2235.530018][ T2596] ? percpu_ref_put_many+0x94/0x190 [ 2235.535318][ T2596] ? percpu_ref_put_many+0x94/0x190 [ 2235.540666][ T2596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2235.547017][ T2596] ? fsnotify+0x811/0xbc0 [ 2235.551373][ T2596] ? fsnotify+0xbc0/0xbc0 [ 2235.555814][ T2596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2235.562072][ T2596] ? fsnotify_first_mark+0x210/0x210 [ 2235.567374][ T2596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2235.573655][ T2596] ? security_file_permission+0x94/0x380 [ 2235.579308][ T2596] ? iter_file_splice_write+0xbe0/0xbe0 [ 2235.584859][ T2596] do_splice_to+0x12a/0x190 [ 2235.589374][ T2596] splice_direct_to_actor+0x2d2/0x970 [ 2235.594792][ T2596] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2235.600394][ T2596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2235.606652][ T2596] ? do_splice_to+0x190/0x190 [ 2235.611344][ T2596] ? rw_verify_area+0x118/0x360 [ 2235.616231][ T2596] do_splice_direct+0x1da/0x2a0 [ 2235.621098][ T2596] ? splice_direct_to_actor+0x970/0x970 [ 2235.626685][ T2596] ? rw_verify_area+0x118/0x360 [ 2235.631548][ T2596] do_sendfile+0x597/0xd00 [ 2235.636026][ T2596] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2235.641328][ T2596] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2235.647598][ T2596] ? fput+0x1b/0x20 [ 2235.651454][ T2596] __x64_sys_sendfile64+0x1dd/0x220 [ 2235.656874][ T2596] ? __ia32_sys_sendfile+0x230/0x230 [ 2235.662198][ T2596] ? do_syscall_64+0x26/0x610 [ 2235.666891][ T2596] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2235.672191][ T2596] ? trace_hardirqs_on+0x67/0x230 [ 2235.677239][ T2596] do_syscall_64+0x103/0x610 [ 2235.681844][ T2596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2235.687740][ T2596] RIP: 0033:0x458209 [ 2235.691639][ T2596] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2235.711258][ T2596] RSP: 002b:00007f7708a8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2235.719797][ T2596] RAX: ffffffffffffffda RBX: 00007f7708a8ac90 RCX: 0000000000458209 [ 2235.727876][ T2596] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2235.735867][ T2596] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2235.743847][ T2596] R10: 0010000000000443 R11: 0000000000000246 R12: 00007f7708a8b6d4 [ 2235.751905][ T2596] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000006 [ 2235.822662][ T2717] mkiss: ax0: crc mode is auto. 17:02:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xa, 0x0, 0x0, 0x0) 17:02:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:09 executing program 2 (fault-call:5 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) getresuid(&(0x7f00000006c0)=0x0, &(0x7f0000000700), &(0x7f0000000740)) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() r11 = getgid() r12 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000840)={{}, {0x1, 0x4}, [{0x2, 0x1, r2}, {0x2, 0x4, r3}, {0x2, 0x4, r4}, {0x2, 0x5, r5}, {0x2, 0x6, r6}, {0x2, 0x1, r7}, {0x2, 0x4, r8}, {0x2, 0x4, r9}], {0x4, 0x4}, [{0x8, 0x0, r10}, {0x8, 0x4, r11}, {0x8, 0x7, r12}], {0x10, 0x4}, {0x20, 0x4}}, 0x7c, 0x3) r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r13, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r13, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8000000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xb, 0x0, 0x0, 0x0) 17:02:09 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x158d}, 0x28) 17:02:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8001000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2236.147631][ T2815] FAULT_INJECTION: forcing a failure. [ 2236.147631][ T2815] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2236.176415][ T2812] mkiss: ax0: crc mode is auto. [ 2236.225544][ T2815] CPU: 0 PID: 2815 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #37 [ 2236.238463][ T2815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2236.249671][ T2815] Call Trace: [ 2236.253004][ T2815] dump_stack+0x172/0x1f0 [ 2236.258908][ T2815] should_fail.cold+0xa/0x15 [ 2236.263526][ T2815] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2236.269350][ T2815] ? ___might_sleep+0x163/0x280 [ 2236.274236][ T2815] should_fail_alloc_page+0x50/0x60 [ 2236.279472][ T2815] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2236.284860][ T2815] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2236.290699][ T2815] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2236.296437][ T2815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2236.302706][ T2815] ? __kmalloc_node+0x3d/0x70 [ 2236.307407][ T2815] ? rcu_read_lock_sched_held+0x110/0x130 [ 2236.313146][ T2815] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2236.319429][ T2815] alloc_pages_current+0x107/0x210 [ 2236.324653][ T2815] push_pipe+0x3fc/0x7a0 [ 2236.328925][ T2815] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 2236.334570][ T2815] ? __save_stack_trace+0x99/0x100 [ 2236.339701][ T2815] ? iov_iter_revert+0xaa0/0xaa0 [ 2236.344655][ T2815] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2236.350493][ T2815] ? iov_iter_pipe+0xba/0x2f0 [ 2236.355408][ T2815] default_file_splice_read+0x199/0x890 [ 2236.361759][ T2815] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2236.367592][ T2815] ? kasan_kmalloc+0x9/0x10 [ 2236.372103][ T2815] ? __kmalloc+0x15c/0x740 [ 2236.376532][ T2815] ? alloc_pipe_info+0x199/0x430 [ 2236.381496][ T2815] ? do_sendfile+0x597/0xd00 [ 2236.386102][ T2815] ? do_syscall_64+0x103/0x610 [ 2236.391757][ T2815] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2236.397842][ T2815] ? __lock_acquire+0x548/0x3fb0 [ 2236.402801][ T2815] ? iter_file_splice_write+0xbe0/0xbe0 [ 2236.408380][ T2815] ? percpu_ref_put_many+0x94/0x190 [ 2236.413601][ T2815] ? percpu_ref_put_many+0x94/0x190 [ 2236.418823][ T2815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2236.425074][ T2815] ? fsnotify+0x811/0xbc0 [ 2236.429431][ T2815] ? fsnotify+0xbc0/0xbc0 [ 2236.433771][ T2815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2236.440027][ T2815] ? fsnotify_first_mark+0x210/0x210 [ 2236.445322][ T2815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2236.451597][ T2815] ? security_file_permission+0x94/0x380 [ 2236.457253][ T2815] ? iter_file_splice_write+0xbe0/0xbe0 [ 2236.462836][ T2815] do_splice_to+0x12a/0x190 [ 2236.467360][ T2815] splice_direct_to_actor+0x2d2/0x970 [ 2236.472780][ T2815] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2236.478358][ T2815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2236.484615][ T2815] ? do_splice_to+0x190/0x190 [ 2236.489323][ T2815] ? rw_verify_area+0x118/0x360 [ 2236.494210][ T2815] do_splice_direct+0x1da/0x2a0 [ 2236.499076][ T2815] ? splice_direct_to_actor+0x970/0x970 [ 2236.504643][ T2815] ? rw_verify_area+0x118/0x360 [ 2236.509518][ T2815] do_sendfile+0x597/0xd00 [ 2236.513961][ T2815] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2236.519270][ T2815] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2236.525524][ T2815] ? fput+0x1b/0x20 [ 2236.529351][ T2815] __x64_sys_sendfile64+0x1dd/0x220 [ 2236.534570][ T2815] ? __ia32_sys_sendfile+0x230/0x230 [ 2236.539883][ T2815] ? do_syscall_64+0x26/0x610 [ 2236.544578][ T2815] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2236.549875][ T2815] ? trace_hardirqs_on+0x67/0x230 [ 2236.554912][ T2815] do_syscall_64+0x103/0x610 [ 2236.559523][ T2815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2236.565445][ T2815] RIP: 0033:0x458209 [ 2236.569353][ T2815] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2236.588973][ T2815] RSP: 002b:00007f7708a8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2236.597411][ T2815] RAX: ffffffffffffffda RBX: 00007f7708a8ac90 RCX: 0000000000458209 [ 2236.605408][ T2815] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2236.613406][ T2815] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8002000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2236.621405][ T2815] R10: 0010000000000443 R11: 0000000000000246 R12: 00007f7708a8b6d4 [ 2236.629401][ T2815] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000006 17:02:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:10 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x158e}, 0x28) 17:02:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xd, 0x0, 0x0, 0x0) 17:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8003000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2236.816496][ T3025] mkiss: ax0: crc mode is auto. 17:02:10 executing program 2 (fault-call:5 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x100000, 0x18000}) 17:02:10 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x158f}, 0x28) 17:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8096980000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8600000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:10 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1590}, 0x28) 17:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8c00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2237.086731][ T3171] mkiss: ax0: crc mode is auto. 17:02:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x14, 0x0, 0x0, 0x0) 17:02:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:10 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1591}, 0x28) 17:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2237.298028][ T3320] mkiss: ax0: crc mode is auto. 17:02:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:10 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000300)={'\x00', @ifru_mtu=0x800}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x3) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) clock_gettime(0x2, &(0x7f0000000340)) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000280)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r5, 0x10000}}, 0x18) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x105000, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x40000000000011) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000000)={0x800100b, 0x0, 0x1}) syz_kvm_setup_cpu$x86(r6, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:10 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1592}, 0x28) 17:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x97d981cc7b010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x50, 0x0, 0x0, 0x0) [ 2237.516014][ T3541] mkiss: ax0: crc mode is auto. 17:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x9fc9a6cd7b010000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:10 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1593}, 0x28) 17:02:11 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa601000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:11 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1594}, 0x28) 17:02:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xc0, 0x0, 0x0, 0x0) 17:02:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000409) [ 2237.811806][ T3796] mkiss: ax0: crc mode is auto. 17:02:11 executing program 5: lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000100)=@v1={0x2, "4dfd296bcafe0732f8"}, 0xa, 0x3) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x10000, 0x0) syz_open_pts(r3, 0x208000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000180)) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa800000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:11 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1595}, 0x28) 17:02:11 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:11 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1596}, 0x28) [ 2238.007349][ T3823] mkiss: ax0: crc mode is auto. 17:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xa801000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x300, 0x0, 0x0, 0x0) 17:02:11 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xae02000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:11 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1597}, 0x28) 17:02:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x1) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xfffffc3a, 0x51, 0x0, 0xfffffffffffffc72) 17:02:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x900) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000200)={0x5, 0x1f, 0x401, 0x12, &(0x7f00000000c0)=""/18, 0x72, &(0x7f0000000100)=""/114, 0x61, &(0x7f0000000180)=""/97}) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000), 0x4) [ 2238.315043][ T4128] mkiss: ax0: crc mode is auto. 17:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xb002000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:11 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1598}, 0x28) 17:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xba03000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x500, 0x0, 0x0, 0x0) 17:02:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x0, 0x6, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000080)={0xffffffff, "fe6434b8982a361bf5fc8ccf32a83ee4e0a8613f6899bf3b0305e2da8f0a6668", 0x3, 0x1}) sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc001000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:11 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1599}, 0x28) [ 2238.688423][ T4595] mkiss: ax0: crc mode is auto. 17:02:12 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x159a}, 0x28) 17:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc400000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 17:02:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x600, 0x0, 0x0, 0x0) 17:02:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r4, 0x0, 0x10000000000443) 17:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xc403000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:12 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x159b}, 0x28) [ 2238.941535][ T4797] mkiss: ax0: crc mode is auto. 17:02:12 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x159c}, 0x28) 17:02:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xd402000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) accept4(r0, &(0x7f00000000c0)=@ethernet={0x0, @remote}, &(0x7f0000000140)=0x80, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000080)={0x0, 0x39, 0x1, &(0x7f0000000040)=0x2}) sendfile(r1, r2, 0x0, 0x10000000000443) socket$bt_hidp(0x1f, 0x3, 0x6) 17:02:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x700, 0x0, 0x0, 0x0) 17:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xd503000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2239.229343][ T5111] mkiss: ax0: crc mode is auto. 17:02:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000100)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1ff, 0x1, 0x1000, 0x1000, &(0x7f0000021000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000180)={0x6, 0xfffffffffffff800, 0x7, 0x2a5, 0x5}) 17:02:12 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x159d}, 0x28) 17:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe402000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:12 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x900, 0x0, 0x0, 0x0) 17:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe403000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x40200) pipe(&(0x7f0000000040)={0xffffffffffffffff}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="660f6ecb36d8f567660fe6f66627bad104ed3bdf0f01c80f20c06635000001000f22c0ba4200b00bee0fc79e0098", 0x2e}], 0x1, 0x0, &(0x7f0000000140), 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000000c0)={0x3f, @local, 0x4e20, 0x3, 'wrr\x00', 0x8, 0xbf, 0x40}, 0x2c) r4 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r4, r5, 0x0, 0x10000000000443) 17:02:12 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x159e}, 0x28) [ 2239.488944][ T5328] mkiss: ax0: crc mode is auto. [ 2239.541760][ T5359] IPVS: set_ctl: invalid protocol: 63 172.20.20.170:20000 17:02:12 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe503000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:13 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x159f}, 0x28) 17:02:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000002500)='/proc/capi/capi20ncci\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000002540)={0x0, @in6={{0xa, 0x4e23, 0x5f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}, 0x9, 0x20, 0x2, 0x10001, 0x9}, &(0x7f0000002600)=0x98) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000100)={r2, @in={{0x2, 0x4e23, @remote}}}, 0x84) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x40000000000011) connect(r1, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x3, @dev={[], 0x22}, 'team0\x00'}}, 0x80) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2239.722641][ T5542] mkiss: ax0: crc mode is auto. 17:02:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) getpeername(r0, &(0x7f0000000280)=@can={0x1d, 0x0}, &(0x7f0000000200)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) setfsuid(r3) connect$packet(r1, &(0x7f0000000300)={0x11, 0x3, r2, 0x1, 0xffffffff80000001, 0x6, @local}, 0x14) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r4, 0x0, 0x5) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) write$binfmt_elf32(r4, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1ff, 0x1ff, 0x8, 0x1, 0xe0c, 0x3, 0x0, 0x31, 0x337, 0x38, 0x15b, 0xa9b, 0x8001, 0x20, 0x1, 0x100000001, 0x9, 0x401}, [{0x6, 0x3, 0x7, 0xfff, 0x91b2c99, 0x20, 0x58, 0x1000}, {0x70000000, 0x1f, 0x40, 0x0, 0x4, 0x401, 0xffffffffffffff81, 0x4}], "dac819f416b9440f533bc6a60ad4fff8d6e670f504073666f088b3c88e9d3710f730749136c56e3763f569c578fdcfbebb939f7ed7fce8caa09d60489b3d3a3b2839a1715c609437d7809b0e96945e1b4f6c7f97b266a77781dbba343bc2a1f8d41e7beb", [[], [], [], []]}, 0x4dc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', r5}) 17:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xe801000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xa00, 0x0, 0x0, 0x0) 17:02:13 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:13 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a0}, 0x28) 17:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2239.948321][ T5584] mkiss: ax0: crc mode is auto. 17:02:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64fdd9f6", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) socket$inet6(0xa, 0x8000a, 0x6) 17:02:13 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a1}, 0x28) 17:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xec00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xee01000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2240.248119][ T6045] mkiss: ax0: crc mode is auto. 17:02:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x40000000000011) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cgroup\x00') ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000100)={0x7f, 0x3, 0x5, 0x6, 0x200, 0xd, 0x15, "383bfdf206a0c2b1ffbb79306a76fb9d0992210d", "c45d01090674be2188aaf429a29e517fc7ef2d85"}) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r2, 0x0, 0x10000000000445) 17:02:13 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a2}, 0x28) 17:02:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xb00, 0x0, 0x0, 0x0) 17:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf400000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:13 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a3}, 0x28) 17:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf602000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000040)) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) [ 2240.476432][ T6095] mkiss: ax0: crc mode is auto. 17:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:13 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a4}, 0x28) 17:02:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2240.766001][ T6471] mkiss: ax0: crc mode is auto. 17:02:14 executing program 5 (fault-call:7 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xd00, 0x0, 0x0, 0x0) 17:02:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f0000000340)=0xfde0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x8000, 0x0) epoll_create1(0x80000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x101, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x4000) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) r4 = fcntl$getown(r0, 0x9) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={r4, r5, r6}, 0xc) r7 = syz_open_procfs(r4, &(0x7f00000000c0)='mountstats\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) sendfile(r1, r7, 0x0, 0x10000000000443) mkdir(&(0x7f0000000280)='./file0\x00', 0x14a) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) epoll_wait(r3, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2) 17:02:14 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a5}, 0x28) 17:02:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfa03000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:14 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a6}, 0x28) [ 2241.065597][ T6515] mkiss: ax0: crc mode is auto. [ 2241.107133][ T6525] FAULT_INJECTION: forcing a failure. [ 2241.107133][ T6525] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.153254][ T6525] CPU: 1 PID: 6525 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #37 [ 2241.161276][ T6525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2241.171352][ T6525] Call Trace: [ 2241.174688][ T6525] dump_stack+0x172/0x1f0 [ 2241.179050][ T6525] should_fail.cold+0xa/0x15 [ 2241.183669][ T6525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2241.189500][ T6525] ? ___might_sleep+0x163/0x280 [ 2241.189523][ T6525] __should_failslab+0x121/0x190 [ 2241.189547][ T6525] should_failslab+0x9/0x14 [ 2241.203930][ T6525] kmem_cache_alloc_trace+0x2d1/0x760 [ 2241.209328][ T6525] ? _parse_integer+0x139/0x190 [ 2241.214234][ T6525] alloc_pipe_info+0xb9/0x430 [ 2241.214258][ T6525] splice_direct_to_actor+0x775/0x970 [ 2241.214275][ T6525] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2241.214291][ T6525] ? lock_downgrade+0x880/0x880 [ 2241.214306][ T6525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2241.214321][ T6525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2241.214333][ T6525] ? do_splice_to+0x190/0x190 17:02:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfb03000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfc00000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2241.214352][ T6525] ? rw_verify_area+0x118/0x360 [ 2241.214368][ T6525] do_splice_direct+0x1da/0x2a0 [ 2241.214394][ T6525] ? splice_direct_to_actor+0x970/0x970 [ 2241.214418][ T6525] ? rw_verify_area+0x118/0x360 [ 2241.214439][ T6525] do_sendfile+0x597/0xd00 [ 2241.276699][ T6525] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2241.282016][ T6525] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2241.288284][ T6525] ? fput+0x1b/0x20 [ 2241.292207][ T6525] __x64_sys_sendfile64+0x1dd/0x220 [ 2241.297431][ T6525] ? __ia32_sys_sendfile+0x230/0x230 [ 2241.297448][ T6525] ? do_syscall_64+0x26/0x610 [ 2241.297465][ T6525] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2241.297489][ T6525] ? trace_hardirqs_on+0x67/0x230 [ 2241.297505][ T6525] do_syscall_64+0x103/0x610 [ 2241.297524][ T6525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2241.297536][ T6525] RIP: 0033:0x458209 [ 2241.297550][ T6525] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:02:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="49e5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 2241.297557][ T6525] RSP: 002b:00007fc5e1688c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2241.297570][ T6525] RAX: ffffffffffffffda RBX: 00007fc5e1688c90 RCX: 0000000000458209 [ 2241.297578][ T6525] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2241.297585][ T6525] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2241.297594][ T6525] R10: 0010000000000443 R11: 0000000000000246 R12: 00007fc5e16896d4 [ 2241.297602][ T6525] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000007 17:02:14 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a7}, 0x28) 17:02:14 executing program 5 (fault-call:7 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1400, 0x0, 0x0, 0x0) 17:02:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xfc02000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000140)={r2}) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="bd153ba4e115f9a47bb03642a2f6027896a213e264875e909d1218429f9a86cad57b22234a964dccdfea698a8b9d15a1bc5ff8588a0951ea5f78b511b46a45fdd73785c0d72cec7bd26143eb84399f90fc62c39dfc0264c04c986c02482f0fc7006f4ef2cdf063de0d82ea24c3f37234f482f7cff18acc482fc67fcdb5f4a25cd0ae8d09c28d24ed170880d27b0699c50febf0e13b2b637e7bddf17f7f7385b4915a05e5cf553a97c994af508ef0b896c37e02623908ad3594bd6f4d1174f2f3b6a5dfcb0e59f4acf767e5395ad7ffe7", 0xd0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r4, 0x0, 0x10000000000443) 17:02:15 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a8}, 0x28) 17:02:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xff0f000000000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2241.689004][ T6939] mkiss: ax0: crc mode is auto. [ 2241.690625][ T6947] FAULT_INJECTION: forcing a failure. [ 2241.690625][ T6947] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.754296][ T6947] CPU: 1 PID: 6947 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #37 [ 2241.762933][ T6947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2241.773041][ T6947] Call Trace: [ 2241.776371][ T6947] dump_stack+0x172/0x1f0 [ 2241.781009][ T6947] should_fail.cold+0xa/0x15 [ 2241.785625][ T6947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2241.791479][ T6947] ? ___might_sleep+0x163/0x280 [ 2241.796358][ T6947] __should_failslab+0x121/0x190 [ 2241.801337][ T6947] should_failslab+0x9/0x14 [ 2241.805869][ T6947] __kmalloc+0x2dc/0x740 [ 2241.810163][ T6947] ? kmem_cache_alloc_trace+0x354/0x760 [ 2241.815735][ T6947] ? _parse_integer+0x139/0x190 [ 2241.820623][ T6947] ? alloc_pipe_info+0x199/0x430 [ 2241.825601][ T6947] alloc_pipe_info+0x199/0x430 [ 2241.830412][ T6947] splice_direct_to_actor+0x775/0x970 [ 2241.835830][ T6947] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2241.841423][ T6947] ? lock_downgrade+0x880/0x880 [ 2241.846299][ T6947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2241.852583][ T6947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2241.858973][ T6947] ? do_splice_to+0x190/0x190 [ 2241.863695][ T6947] ? rw_verify_area+0x118/0x360 [ 2241.868570][ T6947] do_splice_direct+0x1da/0x2a0 [ 2241.873455][ T6947] ? splice_direct_to_actor+0x970/0x970 [ 2241.879161][ T6947] ? rw_verify_area+0x118/0x360 [ 2241.884116][ T6947] do_sendfile+0x597/0xd00 [ 2241.888580][ T6947] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2241.893885][ T6947] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2241.900235][ T6947] ? fput+0x1b/0x20 17:02:15 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15a9}, 0x28) 17:02:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) [ 2241.904065][ T6947] __x64_sys_sendfile64+0x1dd/0x220 [ 2241.909308][ T6947] ? __ia32_sys_sendfile+0x230/0x230 [ 2241.914703][ T6947] ? do_syscall_64+0x26/0x610 [ 2241.919684][ T6947] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2241.919705][ T6947] ? trace_hardirqs_on+0x67/0x230 [ 2241.919729][ T6947] do_syscall_64+0x103/0x610 [ 2241.934667][ T6947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2241.940599][ T6947] RIP: 0033:0x458209 17:02:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2241.944508][ T6947] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2241.964391][ T6947] RSP: 002b:00007fc5e1688c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2241.964408][ T6947] RAX: ffffffffffffffda RBX: 00007fc5e1688c90 RCX: 0000000000458209 [ 2241.964414][ T6947] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2241.964421][ T6947] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:02:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2241.964429][ T6947] R10: 0010000000000443 R11: 0000000000000246 R12: 00007fc5e16896d4 [ 2241.964438][ T6947] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000007 17:02:15 executing program 5 (fault-call:7 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:15 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15aa}, 0x28) 17:02:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r1, 0x0, 0x10000000000442) ioctl$KDMKTONE(r1, 0x4b30, 0x7) 17:02:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x2000, 0x0, 0x0, 0x0) 17:02:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2242.165160][ T7344] mkiss: ax0: crc mode is auto. [ 2242.252830][ T7374] FAULT_INJECTION: forcing a failure. [ 2242.252830][ T7374] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.312153][ T7374] CPU: 1 PID: 7374 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #37 [ 2242.320215][ T7374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2242.330480][ T7374] Call Trace: [ 2242.333895][ T7374] dump_stack+0x172/0x1f0 [ 2242.338258][ T7374] should_fail.cold+0xa/0x15 [ 2242.342882][ T7374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2242.348815][ T7374] ? ___might_sleep+0x163/0x280 [ 2242.354045][ T7374] __should_failslab+0x121/0x190 [ 2242.359012][ T7374] should_failslab+0x9/0x14 [ 2242.363535][ T7374] kmem_cache_alloc_node_trace+0x270/0x720 [ 2242.369371][ T7374] ? lock_downgrade+0x880/0x880 [ 2242.374258][ T7374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2242.374282][ T7374] __kmalloc_node+0x3d/0x70 [ 2242.374302][ T7374] kvmalloc_node+0x68/0x100 [ 2242.374321][ T7374] iov_iter_get_pages_alloc+0x862/0x1350 [ 2242.374337][ T7374] ? unwind_get_return_address+0x61/0xa0 [ 2242.374352][ T7374] ? __save_stack_trace+0x99/0x100 [ 2242.374369][ T7374] ? iov_iter_revert+0xaa0/0xaa0 [ 2242.374395][ T7374] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2242.374409][ T7374] ? iov_iter_pipe+0xba/0x2f0 [ 2242.374429][ T7374] default_file_splice_read+0x199/0x890 [ 2242.374446][ T7374] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2242.374474][ T7374] ? kasan_kmalloc+0x9/0x10 [ 2242.385412][ T7374] ? __kmalloc+0x15c/0x740 [ 2242.385429][ T7374] ? alloc_pipe_info+0x199/0x430 [ 2242.385446][ T7374] ? do_sendfile+0x597/0xd00 [ 2242.385462][ T7374] ? do_syscall_64+0x103/0x610 [ 2242.385479][ T7374] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2242.385493][ T7374] ? __lock_acquire+0x548/0x3fb0 [ 2242.385511][ T7374] ? iter_file_splice_write+0xbe0/0xbe0 [ 2242.385533][ T7374] ? percpu_ref_put_many+0x94/0x190 [ 2242.385553][ T7374] ? percpu_ref_put_many+0x94/0x190 [ 2242.396946][ T7374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2242.407714][ T7374] ? fsnotify+0x811/0xbc0 [ 2242.407734][ T7374] ? fsnotify+0xbc0/0xbc0 [ 2242.407749][ T7374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2242.407762][ T7374] ? fsnotify_first_mark+0x210/0x210 [ 2242.407774][ T7374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2242.407802][ T7374] ? security_file_permission+0x94/0x380 [ 2242.407822][ T7374] ? iter_file_splice_write+0xbe0/0xbe0 [ 2242.407845][ T7374] do_splice_to+0x12a/0x190 [ 2242.533357][ T7374] splice_direct_to_actor+0x2d2/0x970 [ 2242.538759][ T7374] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2242.544325][ T7374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2242.550594][ T7374] ? do_splice_to+0x190/0x190 [ 2242.555298][ T7374] ? rw_verify_area+0x118/0x360 [ 2242.560167][ T7374] do_splice_direct+0x1da/0x2a0 [ 2242.565051][ T7374] ? splice_direct_to_actor+0x970/0x970 [ 2242.570628][ T7374] ? rw_verify_area+0x118/0x360 [ 2242.575524][ T7374] do_sendfile+0x597/0xd00 [ 2242.579968][ T7374] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2242.585276][ T7374] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2242.591538][ T7374] ? fput+0x1b/0x20 [ 2242.595367][ T7374] __x64_sys_sendfile64+0x1dd/0x220 [ 2242.600597][ T7374] ? __ia32_sys_sendfile+0x230/0x230 [ 2242.605901][ T7374] ? do_syscall_64+0x26/0x610 [ 2242.610598][ T7374] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2242.615903][ T7374] ? trace_hardirqs_on+0x67/0x230 [ 2242.620960][ T7374] do_syscall_64+0x103/0x610 [ 2242.625576][ T7374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2242.631497][ T7374] RIP: 0033:0x458209 [ 2242.635433][ T7374] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2242.655229][ T7374] RSP: 002b:00007fc5e1688c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:02:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="b5cb089a88d95faa91d0a037d35d8d516d815e12481575da4bb26b309ba8555c8153cd03259cccb538d5fd6c6829919886c764c5954405a345d4123932618b53d7cdc2e5b2b92c11e621286aa5db9da4db31918cdad675dd861e43a1208547577db2a6f925a440d53025df8f08db8a85fc7847d81760c9bcd652e81ee5ab94507720661ecec735b6c2d064d0b809184ef769eda49595a300fad74d832a5e64729674edb62b1384d736a495f484f53f50c1b9c7a7cbb9e6bad6b601bf5e54bc8842467b", 0xc3, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r2, 0x3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:16 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ab}, 0x28) 17:02:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2242.663754][ T7374] RAX: ffffffffffffffda RBX: 00007fc5e1688c90 RCX: 0000000000458209 [ 2242.671740][ T7374] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2242.671749][ T7374] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2242.671757][ T7374] R10: 0010000000000443 R11: 0000000000000246 R12: 00007fc5e16896d4 [ 2242.671774][ T7374] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000007 17:02:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x3f00, 0x0, 0x0, 0x0) 17:02:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:16 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ac}, 0x28) 17:02:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:16 executing program 5 (fault-call:7 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:16 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ad}, 0x28) [ 2243.011616][ T7858] FAULT_INJECTION: forcing a failure. [ 2243.011616][ T7858] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2243.064709][ T7858] CPU: 0 PID: 7858 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #37 [ 2243.072828][ T7858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2243.082897][ T7858] Call Trace: [ 2243.086220][ T7858] dump_stack+0x172/0x1f0 [ 2243.090594][ T7858] should_fail.cold+0xa/0x15 [ 2243.095206][ T7858] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2243.101037][ T7858] ? ___might_sleep+0x163/0x280 [ 2243.105910][ T7858] should_fail_alloc_page+0x50/0x60 [ 2243.111132][ T7858] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2243.116517][ T7858] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2243.122346][ T7858] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2243.128115][ T7858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.134374][ T7858] ? __kmalloc_node+0x3d/0x70 [ 2243.139070][ T7858] ? rcu_read_lock_sched_held+0x110/0x130 [ 2243.144797][ T7858] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2243.151051][ T7858] alloc_pages_current+0x107/0x210 [ 2243.156195][ T7858] push_pipe+0x3fc/0x7a0 [ 2243.160449][ T7858] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 2243.166124][ T7858] ? __save_stack_trace+0x99/0x100 [ 2243.171261][ T7858] ? iov_iter_revert+0xaa0/0xaa0 [ 2243.176208][ T7858] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2243.181934][ T7858] ? iov_iter_pipe+0xba/0x2f0 [ 2243.186621][ T7858] default_file_splice_read+0x199/0x890 [ 2243.192171][ T7858] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2243.198002][ T7858] ? kasan_kmalloc+0x9/0x10 [ 2243.202506][ T7858] ? __kmalloc+0x15c/0x740 [ 2243.206926][ T7858] ? alloc_pipe_info+0x199/0x430 [ 2243.211875][ T7858] ? do_sendfile+0x597/0xd00 [ 2243.216482][ T7858] ? do_syscall_64+0x103/0x610 [ 2243.221247][ T7858] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2243.227321][ T7858] ? __lock_acquire+0x548/0x3fb0 [ 2243.232267][ T7858] ? iter_file_splice_write+0xbe0/0xbe0 [ 2243.237824][ T7858] ? percpu_ref_put_many+0x94/0x190 [ 2243.243055][ T7858] ? percpu_ref_put_many+0x94/0x190 [ 2243.248262][ T7858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.254516][ T7858] ? fsnotify+0x811/0xbc0 [ 2243.259278][ T7858] ? fsnotify+0xbc0/0xbc0 [ 2243.263616][ T7858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.269886][ T7858] ? fsnotify_first_mark+0x210/0x210 [ 2243.275190][ T7858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.281475][ T7858] ? security_file_permission+0x94/0x380 [ 2243.287137][ T7858] ? iter_file_splice_write+0xbe0/0xbe0 [ 2243.292694][ T7858] do_splice_to+0x12a/0x190 [ 2243.297204][ T7858] splice_direct_to_actor+0x2d2/0x970 [ 2243.302602][ T7858] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2243.308172][ T7858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.314428][ T7858] ? do_splice_to+0x190/0x190 [ 2243.319124][ T7858] ? rw_verify_area+0x118/0x360 [ 2243.324001][ T7858] do_splice_direct+0x1da/0x2a0 [ 2243.328863][ T7858] ? splice_direct_to_actor+0x970/0x970 [ 2243.334456][ T7858] ? rw_verify_area+0x118/0x360 [ 2243.339336][ T7858] do_sendfile+0x597/0xd00 [ 2243.343876][ T7858] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2243.349185][ T7858] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2243.355464][ T7858] ? fput+0x1b/0x20 [ 2243.359413][ T7858] __x64_sys_sendfile64+0x1dd/0x220 [ 2243.364828][ T7858] ? __ia32_sys_sendfile+0x230/0x230 [ 2243.370230][ T7858] ? do_syscall_64+0x26/0x610 [ 2243.374941][ T7858] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2243.380245][ T7858] ? trace_hardirqs_on+0x67/0x230 [ 2243.385288][ T7858] do_syscall_64+0x103/0x610 [ 2243.389909][ T7858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2243.395813][ T7858] RIP: 0033:0x458209 [ 2243.399716][ T7858] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2243.419421][ T7858] RSP: 002b:00007fc5e1688c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2243.427854][ T7858] RAX: ffffffffffffffda RBX: 00007fc5e1688c90 RCX: 0000000000458209 [ 2243.435840][ T7858] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2243.443821][ T7858] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2243.451802][ T7858] R10: 0010000000000443 R11: 0000000000000246 R12: 00007fc5e16896d4 17:02:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) listen(r1, 0x970) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/rfcomm\x00') ioctl$SG_SET_KEEP_ORPHAN(r3, 0x2287, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendfile(r1, r3, 0x0, 0x10000000000443) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685) [ 2243.459780][ T7858] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000007 17:02:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x4000, 0x0, 0x0, 0x0) [ 2243.496334][ T7731] XFS (loop1): Invalid superblock magic number 17:02:16 executing program 5 (fault-call:7 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) 17:02:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2243.686830][ T8080] FAULT_INJECTION: forcing a failure. [ 2243.686830][ T8080] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2243.787242][ T8080] CPU: 0 PID: 8080 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #37 [ 2243.795182][ T8080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2243.805253][ T8080] Call Trace: [ 2243.808578][ T8080] dump_stack+0x172/0x1f0 [ 2243.812948][ T8080] should_fail.cold+0xa/0x15 [ 2243.817559][ T8080] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2243.823392][ T8080] ? ___might_sleep+0x163/0x280 [ 2243.828373][ T8080] should_fail_alloc_page+0x50/0x60 [ 2243.833592][ T8080] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2243.838978][ T8080] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2243.844803][ T8080] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2243.850540][ T8080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.856809][ T8080] ? __kmalloc_node+0x3d/0x70 [ 2243.861510][ T8080] ? rcu_read_lock_sched_held+0x110/0x130 [ 2243.867270][ T8080] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2243.873549][ T8080] alloc_pages_current+0x107/0x210 [ 2243.878675][ T8080] push_pipe+0x3fc/0x7a0 [ 2243.883020][ T8080] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 2243.888676][ T8080] ? __save_stack_trace+0x99/0x100 [ 2243.893800][ T8080] ? iov_iter_revert+0xaa0/0xaa0 [ 2243.898752][ T8080] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2243.904486][ T8080] ? iov_iter_pipe+0xba/0x2f0 [ 2243.909184][ T8080] default_file_splice_read+0x199/0x890 [ 2243.914745][ T8080] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2243.920570][ T8080] ? kasan_kmalloc+0x9/0x10 [ 2243.925083][ T8080] ? __kmalloc+0x15c/0x740 [ 2243.929510][ T8080] ? alloc_pipe_info+0x199/0x430 [ 2243.934468][ T8080] ? do_sendfile+0x597/0xd00 [ 2243.939070][ T8080] ? do_syscall_64+0x103/0x610 [ 2243.943841][ T8080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2243.949926][ T8080] ? __lock_acquire+0x548/0x3fb0 [ 2243.954884][ T8080] ? iter_file_splice_write+0xbe0/0xbe0 [ 2243.960485][ T8080] ? percpu_ref_put_many+0x94/0x190 [ 2243.965705][ T8080] ? percpu_ref_put_many+0x94/0x190 [ 2243.970918][ T8080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.977258][ T8080] ? fsnotify+0x811/0xbc0 [ 2243.981693][ T8080] ? fsnotify+0xbc0/0xbc0 [ 2243.986029][ T8080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.992285][ T8080] ? fsnotify_first_mark+0x210/0x210 [ 2243.997584][ T8080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2244.003874][ T8080] ? security_file_permission+0x94/0x380 [ 2244.009527][ T8080] ? iter_file_splice_write+0xbe0/0xbe0 [ 2244.015083][ T8080] do_splice_to+0x12a/0x190 [ 2244.019601][ T8080] splice_direct_to_actor+0x2d2/0x970 [ 2244.024990][ T8080] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2244.030582][ T8080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2244.036840][ T8080] ? do_splice_to+0x190/0x190 [ 2244.041536][ T8080] ? rw_verify_area+0x118/0x360 [ 2244.046418][ T8080] do_splice_direct+0x1da/0x2a0 [ 2244.051321][ T8080] ? splice_direct_to_actor+0x970/0x970 [ 2244.056916][ T8080] ? rw_verify_area+0x118/0x360 [ 2244.061804][ T8080] do_sendfile+0x597/0xd00 [ 2244.066245][ T8080] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2244.071551][ T8080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2244.077830][ T8080] ? fput+0x1b/0x20 [ 2244.081654][ T8080] __x64_sys_sendfile64+0x1dd/0x220 [ 2244.086872][ T8080] ? __ia32_sys_sendfile+0x230/0x230 [ 2244.092168][ T8080] ? do_syscall_64+0x26/0x610 [ 2244.096883][ T8080] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2244.102182][ T8080] ? trace_hardirqs_on+0x67/0x230 [ 2244.107231][ T8080] do_syscall_64+0x103/0x610 [ 2244.111837][ T8080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2244.117739][ T8080] RIP: 0033:0x458209 [ 2244.121642][ T8080] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2244.141266][ T8080] RSP: 002b:00007fc5e1688c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2244.149723][ T8080] RAX: ffffffffffffffda RBX: 00007fc5e1688c90 RCX: 0000000000458209 [ 2244.157798][ T8080] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2244.165783][ T8080] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2244.173792][ T8080] R10: 0010000000000443 R11: 0000000000000246 R12: 00007fc5e16896d4 [ 2244.181799][ T8080] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000007 17:02:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x5000, 0x0, 0x0, 0x0) 17:02:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = getpid() ptrace$setregs(0xf, r3, 0x4, &(0x7f0000000000)="5e28d26d9665fedabba15543927ac1a072ce12511a0ad694112e24125037bea59ef4cb6cc028dbc654f452493c49d89daf40b07a1fcd5bfde862768645b289fa94370c7a87ff1722385305f0116fca413ad03d3080ef699aad92f8bd") ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f00000000c0)) sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000080)) 17:02:17 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ae}, 0x28) 17:02:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:17 executing program 5 (fault-call:7 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) [ 2244.395836][ T8279] FAULT_INJECTION: forcing a failure. [ 2244.395836][ T8279] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2244.436351][ T8279] CPU: 1 PID: 8279 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #37 [ 2244.444337][ T8279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2244.454430][ T8279] Call Trace: [ 2244.457756][ T8279] dump_stack+0x172/0x1f0 [ 2244.462137][ T8279] should_fail.cold+0xa/0x15 [ 2244.466758][ T8279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2244.472608][ T8279] ? ___might_sleep+0x163/0x280 [ 2244.477484][ T8279] should_fail_alloc_page+0x50/0x60 17:02:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2244.482694][ T8279] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2244.488077][ T8279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2244.493905][ T8279] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2244.499639][ T8279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2244.505919][ T8279] ? __kmalloc_node+0x3d/0x70 [ 2244.510633][ T8279] ? rcu_read_lock_sched_held+0x110/0x130 [ 2244.516379][ T8279] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2244.522657][ T8279] alloc_pages_current+0x107/0x210 [ 2244.527814][ T8279] push_pipe+0x3fc/0x7a0 [ 2244.532069][ T8279] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 2244.537716][ T8279] ? __save_stack_trace+0x99/0x100 [ 2244.542845][ T8279] ? iov_iter_revert+0xaa0/0xaa0 [ 2244.547791][ T8279] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2244.553515][ T8279] ? iov_iter_pipe+0xba/0x2f0 [ 2244.558210][ T8279] default_file_splice_read+0x199/0x890 [ 2244.563767][ T8279] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2244.570112][ T8279] ? kasan_kmalloc+0x9/0x10 [ 2244.574629][ T8279] ? __kmalloc+0x15c/0x740 [ 2244.579062][ T8279] ? alloc_pipe_info+0x199/0x430 [ 2244.584006][ T8279] ? do_sendfile+0x597/0xd00 [ 2244.588604][ T8279] ? do_syscall_64+0x103/0x610 [ 2244.593377][ T8279] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2244.599472][ T8279] ? __lock_acquire+0x548/0x3fb0 [ 2244.604434][ T8279] ? iter_file_splice_write+0xbe0/0xbe0 [ 2244.610000][ T8279] ? percpu_ref_put_many+0x94/0x190 [ 2244.615210][ T8279] ? percpu_ref_put_many+0x94/0x190 [ 2244.620418][ T8279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2244.626664][ T8279] ? fsnotify+0x811/0xbc0 [ 2244.631000][ T8279] ? fsnotify+0xbc0/0xbc0 [ 2244.635337][ T8279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2244.641591][ T8279] ? fsnotify_first_mark+0x210/0x210 [ 2244.646899][ T8279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2244.653167][ T8279] ? security_file_permission+0x94/0x380 [ 2244.658813][ T8279] ? iter_file_splice_write+0xbe0/0xbe0 [ 2244.664395][ T8279] do_splice_to+0x12a/0x190 [ 2244.668929][ T8279] splice_direct_to_actor+0x2d2/0x970 [ 2244.674313][ T8279] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2244.680134][ T8279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2244.686391][ T8279] ? do_splice_to+0x190/0x190 [ 2244.691089][ T8279] ? rw_verify_area+0x118/0x360 [ 2244.695974][ T8279] do_splice_direct+0x1da/0x2a0 [ 2244.700840][ T8279] ? splice_direct_to_actor+0x970/0x970 [ 2244.706406][ T8279] ? rw_verify_area+0x118/0x360 [ 2244.711265][ T8279] do_sendfile+0x597/0xd00 [ 2244.715698][ T8279] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2244.721001][ T8279] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2244.727253][ T8279] ? fput+0x1b/0x20 [ 2244.731090][ T8279] __x64_sys_sendfile64+0x1dd/0x220 [ 2244.736298][ T8279] ? __ia32_sys_sendfile+0x230/0x230 [ 2244.741607][ T8279] ? do_syscall_64+0x26/0x610 [ 2244.746473][ T8279] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2244.751771][ T8279] ? trace_hardirqs_on+0x67/0x230 [ 2244.756814][ T8279] do_syscall_64+0x103/0x610 [ 2244.761427][ T8279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2244.767324][ T8279] RIP: 0033:0x458209 [ 2244.771222][ T8279] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2244.790836][ T8279] RSP: 002b:00007fc5e1688c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2244.799263][ T8279] RAX: ffffffffffffffda RBX: 00007fc5e1688c90 RCX: 0000000000458209 [ 2244.807264][ T8279] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2244.815254][ T8279] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2244.823249][ T8279] R10: 0010000000000443 R11: 0000000000000246 R12: 00007fc5e16896d4 [ 2244.831243][ T8279] R13: 00000000004c5135 R14: 00000000004d8ea8 R15: 0000000000000007 17:02:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) flock(r1, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:18 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15af}, 0x28) 17:02:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ff, 0x0, 0x0, 0x0) [ 2244.954219][ T8324] XFS (loop1): Invalid superblock magic number 17:02:18 executing program 5 (fault-call:7 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x4, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0xbe9b) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) r3 = semget$private(0x0, 0x3, 0x132) semctl$SEM_INFO(r3, 0x2, 0x13, &(0x7f0000000000)=""/21) 17:02:18 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b0}, 0x28) 17:02:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x7400, 0x0, 0x0, 0x0) 17:02:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:18 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b1}, 0x28) 17:02:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x10070) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) [ 2245.556684][ T8840] XFS (loop1): Invalid superblock magic number 17:02:18 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b2}, 0x28) 17:02:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000409) 17:02:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:19 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b3}, 0x28) 17:02:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x9400, 0x0, 0x0, 0x0) 17:02:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f00000002c0)=0x3ff) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000000)) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000040)={0xd, 0x101, 0x3, {0x2, 0x6, 0x4, 0xffffffff}}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x140, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000080), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @empty, 0x4, 0x1}}}, {{@arp={@local, @remote, 0xff000000, 0xff0000ff, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, {[0x0, 0xff, 0x0, 0xff, 0xff]}, 0x4, 0xa87, 0xfffffffffffffffd, 0x4, 0x200, 0x1, 'syz_tun\x00', 'hwsim0\x00', {0xff}, {}, 0x0, 0x206}, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x9}}}, {{@arp={@loopback, @multicast1, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@random="618672b062ff", {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, 0x9, 0x7fffffff, 0x9, 0x7, 0xa8a, 0xf94, 'syz_tun\x00', 'bond_slave_1\x00', {0xff}, {0xff}, 0x0, 0xb8}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x510d, 0xbd, 0x3}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x8c, r3, 0x501, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x48}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x12}}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x40040) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000340)=0x2) 17:02:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x28000, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$addseals(r0, 0x409, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000040)=0x2, 0x4) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:19 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b4}, 0x28) 17:02:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x29) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000000)={0x10f000, 0x6000, 0xaed, 0x5, 0xffffffffffff6152}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2246.230787][ T9307] XFS (loop1): Invalid superblock magic number 17:02:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000040)=0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) syz_open_procfs(r4, &(0x7f0000000180)='clear_refs\x00') ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r5, 0x0, 0x10000000000443) 17:02:19 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b5}, 0x28) 17:02:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x200000, 0x0, 0x0, 0x0) [ 2246.358413][ T9600] mkiss: ax0: crc mode is auto. 17:02:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x103000, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) 17:02:19 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b6}, 0x28) 17:02:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2246.703293][ T9870] mkiss: ax0: crc mode is auto. 17:02:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:20 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b7}, 0x28) 17:02:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x307100, 0x0, 0x0, 0x0) 17:02:20 executing program 2: ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000080)=0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0xaa, 0x100000000, 0x7, 0x4, 0xb, 0x100000000, 0x2, 0x2195102d, 0x9, 0x0, 0x42, 0x8}) 17:02:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x20000) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40040, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x18000, 0x0) r7 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x8001, 0x80) r8 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x140, 0x0) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x20c01, 0x0) r10 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x2, 0x2) r11 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000a000000", @ANYRES32=r4, @ANYBLOB="0000000000f0ffff000000000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000010000000000000000000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000f0ffff01000000", @ANYRES32=r0, @ANYBLOB="00000000004000f0ffffffff0000000001000000", @ANYRES32=r6, @ANYBLOB="00000000004000000000000000f0ffffffffffff", @ANYRES32=r7, @ANYBLOB="0000000000800000000000000000000001000000", @ANYRES32=r8, @ANYBLOB="00000000ccf700000000000000f0ffff00000000", @ANYRES32=r9, @ANYBLOB="0000000000000001000000000080000100000000", @ANYRES32=r10, @ANYBLOB="00000000004000000000000000f0ffff00000000", @ANYRES32=r11, @ANYBLOB="0000000000f0ffffffffffff0000000000000000"]) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r12 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r12, 0x0, 0x10000000000443) 17:02:20 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b8}, 0x28) 17:02:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000180)={0x10201, 0x0, &(0x7f0000ffc000/0x4000)=nil}) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x30, r2, 0x200000000000) futimesat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{r4, r5/1000+10000}, {r6, r7/1000+30000}}) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$KVM_IRQ_LINE_STATUS(r8, 0xc008ae67, &(0x7f00000001c0)={0x93e, 0x7}) sendfile(r2, r8, 0x0, 0x10000000000443) [ 2246.927941][ T9926] XFS (loop1): Invalid superblock magic number 17:02:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x400000, 0x0, 0x0, 0x0) 17:02:20 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b9}, 0x28) 17:02:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000001080)={{0x1cf, 0x8001, 0x1, 0xde, 0x183, 0x5, 0x29f, 0x920f}, "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", [[], [], [], [], [], [], [], [], [], []]}, 0xb1e) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x82800) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x31}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}, 0x3, 0x9, 0x9, 0x5, 0x92}, 0x98) accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') [ 2247.049195][T10192] mkiss: ax0: crc mode is auto. 17:02:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2247.308336][T10471] mkiss: ax0: crc mode is auto. 17:02:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x7, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:20 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x2, 0x40) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x1ff}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000380)={r1, 0x5}, 0xfffffd67) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000002c0)=0x80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000001000000030000000000000004000000fd380000020000000000f4ff0500000000000000020000000000000075f80000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000b50000090000000000000041cb6bc500000000000000000000000004380000000000000000000000000000"]) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x1000) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r3, 0x28, 0x6, &(0x7f0000000200)={0x77359400}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) connect$unix(r4, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendfile(r4, r6, 0x0, 0x10000000000443) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000280)=0x4) 17:02:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000000)=0x3) 17:02:20 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ba}, 0x28) 17:02:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x50b000, 0x0, 0x0, 0x0) 17:02:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:20 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15bb}, 0x28) 17:02:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="6475d9f7", 0xfffffdec) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x7fff, 0x5d, 0x6, 0xa0, 0x9, 0x3, 0x6, 0x6, 0x29e, 0x40, 0xd4, 0x2c, 0x8, 0x38, 0x2, 0x8, 0x100000000, 0x2}, [{0x6, 0x1c, 0x8, 0x5, 0x8, 0x2, 0x1ff, 0x200}], "60f3d70948c9ad5ad98588c041f342c27bd85d620d76345848f38e540afcac82486f4e68ee027c3e459526bfaa8a5ee09e972a2c6fd98b1f09dfedc3396194543394b801bd0eb77a7fce9cf1acacc359254931e1456a1a6d01772398beaacf28ee", [[], []]}, 0x2d9) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) [ 2247.566753][T10633] mkiss: ax0: crc mode is auto. [ 2247.583309][T10524] XFS (loop1): Invalid superblock magic number 17:02:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x1000000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ptype\x00') lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000280)=0x4) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r5 = socket$inet6(0xa, 0x6, 0x9) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000180)=0x4) fanotify_mark(r3, 0x10, 0x8, r3, &(0x7f0000000140)='./file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r6, 0x0, 0x10000000000443) 17:02:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x70a000, 0x0, 0x0, 0x0) 17:02:21 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15bc}, 0x28) 17:02:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$getown(r0, 0x9) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) accept4$alg(r1, 0x0, 0x0, 0x80000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000080)='schedstat\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:21 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15bd}, 0x28) 17:02:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x713000, 0x0, 0x0, 0x0) 17:02:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x1) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x8000) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000180)=0xb3, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001880)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) r5 = fcntl$getown(r3, 0x9) r6 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003100)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003200)={0xffffffffffffffff, r2, 0x0, 0x9, &(0x7f0000000440)='wlan19.[\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003700)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000003800)=0xe8) r10 = geteuid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004ac0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000004b00)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000004c00)=0xe8) stat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000004d40)={&(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x40020}, 0xc, &(0x7f0000004a40)=[{&(0x7f0000000680)={0x11e0, 0x12, 0x3a96d4f2d6eba6ef, 0x70bd29, 0x25dfdbfd, "", [@nested={0x1008, 0x7e, [@typed={0x1004, 0x37, @binary="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"}]}, @typed={0x14, 0x39, @ipv6=@local}, @generic="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", @typed={0x8, 0x26, @u32=0x4}, @generic="1b6f822a9e57c5b00729a2678a3c8680cda460cbc457624886093aa01c16d3a8ed7fe85c9d4b4c22a71f422c2eeb848aaef2708cc38a2007d055efbe7f502893d2cc4bbe5189362e98062595ae71b8276d421f8c8239a91922db956bf9333aecac8397307ba280216841dd20449abccf4c14fc9b684c31f321e9a55b4d984aba9d2a0729d307c20d1c4c0c6444149403a4e149252c27d3a389ba3532b21c0a75fcb2bdc637ad2dc0f691ff"]}, 0x11e0}, {&(0x7f0000000280)={0x11c, 0x25, 0x200, 0x70bd25, 0x25dfdbfd, "", [@typed={0x8, 0x3d, @ipv4=@multicast1}, @nested={0x104, 0x6d, [@typed={0x8, 0x91, @fd=r1}, @generic="d370e58d5cba90c7f452a3c17d67a5ac3d8b169ed839e4db0e74d697b2f97201d4d19f66c3b0cb0a736e7bd947491228dbdb9eabd4889b640b6abf6609bda7ed6af96c9b188da517ff85ef70ab2246820567b717787f49d25a2c24257af4fa095a149dd540925b214fc5ef61c0f2a88bdb12ab7081d810d2be302413ee4815a0cb1aff7c36173bf585d48c247b62171c926e78759728c98e6f1965a62617c9bc92886d1c7d39a262d94bd2eb229f932c1677bd0e47f608ddbbf61c2697237accb2f9a8e445cf487cb055db45286f541c6e44c65722f59aae83d98e5675f13368ddca29d31c75ca8b40933a442b80ad5cac0b64464b6e"]}]}, 0x11c}, {&(0x7f0000001980)={0x1184, 0x28, 0x600, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x3c, 0x6c, @str='user%posix_acl_accesstrusted-&posix_acl_accessGPLGPL+\x00'}, @nested={0x1130, 0x7e, [@generic="3e61e4aa9d119c08d85347bab05b0745a787c2052934cb56b685f9f48c681e071348f0b01486c0a78ba068e9940f1518992b3d2638db9716926d99f883b5bde2eea869b5009892d020afcb9aa5444b7df3022489995552f9396c777b07883ce3b100ee4a8561b36282008328c428da872fe57b8a159460f4a0354972b9e5c5e5339491c86778f752d6fcad694d7461080095a337f23516d00b81775f968eb67615e470477df45e47554860778c11a0c19f67ea2db7ac94f07509cc603b046fba88c8f01a61441d08c23ad62c8c", @generic="126805468dfe", @typed={0x8, 0x11, @uid=r4}, @generic="5a6c711c2744b6ed663fbfab88e6b9207bfef8954f33c85ee05b9a1b757191643fca55baed66eee71ee47fc0a6e038a8a1ee697f6cf6613abe6dd7f9bcba87f53b81d2e97b126febb3c46db4d98a4445", @generic="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"]}, @typed={0x8, 0x39, @pid=r5}]}, 0x1184}, {&(0x7f0000002b40)={0x474, 0x18, 0x500, 0x70bd25, 0x25dfdbfe, "", [@nested={0xdc, 0xf, [@generic="e0df0859f7593ad358007729fda117ead0f678c14e87c0c76740a5a4c0ef0535cb19a076003d3155c819ababc506a8c174446cfe877845a469c3e643568183747463e0cb77d0d9fe1c50296917b9b8c59bca12d9d94c5ad40d99eab9597b144946d87bf6a93c8473f61a719ec09207eac5cec8c83d040e59f891b92c", @typed={0xc, 0x7, @u64=0x2}, @generic="ae6b4ec81c9c87da51735b80275d92124cf426213e8aaa9e5c17ce", @generic="bb1a065a32e74f1405ab1f3ccc45d4761c063521175a3fdb669c1686dbdfd76042445a01d9ae78f8afb903", @typed={0x8, 0x53, @uid=r6}]}, @typed={0x8, 0x71, @ipv4=@rand_addr=0x100}, @generic="c787844d7b919e2b2dc472c5b48f7930e5ec6119b657772f6263c670e07565b48f9fd78e18f1d7667d30180e05e1e08e7880d7b7ca5386e2f3468a10f820731b0c0dfbf2901e1f475f9b900bfbc493cd2eabe522f5e452c735e9fca3ec1909", @nested={0x320, 0x4b, [@typed={0x64, 0x89, @binary="199b77007ffe3da38a3cb0ed94bfd528d5841dd17a678490853645c215a34f0388642ddef5bfb78aa4938443fdcc643b34c7669ab5e670ca5ac9ca23baadb9c6e2704e44e64fbe3a7970c210c918001be5045b042c256c8800d33f6b4d"}, @typed={0xf8, 0x5a, @binary="219fc7c0ece9ded67477dbe9b5dafa313e9510585db2611b8f69a53826acc87432797e42e0edbd1033449b8356656f52335a4e9c4dbd9ac28e10bed731760090fab2d6697818d37d64d20197efdade07a6020584c5735e401920e6eaad66e241e8785a81f1b35edb27ca805ca4a264f5762a9d66353f99d80b637deb642889687b3e50a6377f2486174027c601fd3e49206fbc55a4634307a6da396307737b1a4ea41d20908c8f198e634f6791a1f6fe7ad4e004c9994085dcd097f9613e78effdd6299f09a958f9d186fcd890bec1378764a2b0d56d67e31df3f96231ad8ec0bc252fd7640d730735da2bb726bfddf9fb"}, @generic="dd8167d89222cfc92accf462709659cbd1247a36741948301d416dd0e662f9f058cc0ff985e0c5a4065161d583b2f1907fbb457468838fc677b15767d049470a490ba9d8178d7682d26a6a1b726f269470c4daa1f8af2818160cdc9da6808eb640d95a18d765ac", @typed={0x8, 0x26, @ipv4=@broadcast}, @generic="243a1a321836872297c1acbee341ca89b00b71a37d59b01b4184b2f1fa9f606090b0f87d0253b62ded030536b1b00a737959dd1e782da0ade7e09cca0a17d2a67d685155dedaf94a67b22201701a0799651b19bb1883ea4505e4d9253db54c92d8c227178185d78a8de225649c7687a5b7a8f2bde286f62184078ecadf722a32b004f41dfd757215747415c1bdadd120d0522c3724fd8084376edbfc9d578fae163fa043925185e7a7db1ce075737dbed8462726dcf9f8747ae73cee24314b2e4c466059edc12c304c7d144b2c750c57d8d2d3adc76f91e1410c57d3610cc4bd1be97baff8d7", @typed={0x4, 0x44}, @typed={0x4, 0x4a}, @generic="890a19c82d1b0e81001d0d7cc88b5d61c7fa8c6801a0d9a19a7cf3740e253461d713cf8d0a69ded26f8cbd2d711e68e16f7e934d6804577c1d0a2e15dc741049b8fd80d4a3b26ca610294b30f38d6816b8381fc272a5e8a4d55f4c42d21ac2bfbc"]}]}, 0x474}, {&(0x7f0000002fc0)={0x108, 0x42, 0x0, 0x70bd2d, 0x25dfdbfe, "", [@typed={0xf8, 0x3b, @binary="0de618046c130b689817c417329404a151d73c356f37e4cd2e237855643b38743c223360450fa1dfbc814e5c1146e4c5396f4503bbb1d6e5e714815c172abca956074e3f27ae780de8ad7e515f23e122bf33aae68390f8938bc06b50cea9e9d93b3a9fe68de51447a45a4889741080b65b6ac5584fcf54a31b67e460355e9946af1834af555756b2ebe09c7b1eab8d3d469175005852d5121f625db249ab22ad43550b0285a806cc422e41fc31fe4f96492eb5dc99367eee4b1b39cef6bb97557822057a8823203141948b8ac7002798fd8831552da79a2eeec0425a3352a787162ad6f3dd8c663d15cf293b98955d14b71e"}]}, 0x108}, {&(0x7f0000003240)={0x4bc, 0x34, 0x100, 0x70bd28, 0x25dfdbfe, "", [@typed={0x4, 0x1a}, @generic="a15089f2fc5118697d393d61752989b50b236d272264930cdc3e36aa813cc014fcacad6eb96bde350564a6f49c1c803afe441ccb75825bc3f2c674e59fcf91547a39b0c71d900b44a2beaaa58630cae8b5262d28a6982a42ef6591f1f62ad8299d9f76f5319d13dc5e48724cbe77fb4680", @nested={0x24c, 0x2e, [@typed={0xc, 0x63, @u64=0x63}, @typed={0x4, 0x7f, @binary}, @typed={0x8, 0x5b, @uid=r7}, @generic="0ac2a699480144a67951bdb28f6f95ba57c1e333d5ec247b8b38fc273f637a0ca2da931a6a05ead2e58f94b94277bfbdf0bf1b4696fe74f96a6f0a18696299a3f23f8cfbee8acd013bd31a", @generic="a00a050407146e2af5c2fe2b8b641045120b4b2d4ce954561f8bea39c5cf4bbcc70c66aae81058db33a3ca88e07a569d69e6124513de109902833485a6115085648d4672f587cb1636760bc6c3b21e7df5410960a9def61ee2a9642b2ec5c70de427e78654364a562b656fdce44f765cdc461e70f389", @generic="c6c63a6e2f6fc39af1f269700cda55b6ee5c396cdfcabf8b5ded011248a87ab9be58eea00c0047fc59ecbebe972c793bedade1842369a0007cd1ab8d05a8b70acf39f7070f209c980ce886e152278648d61b79aa1087a28ef817090a8e5683307a868dbea42d0ca6a84e9f0b9169014f1887c229cb3830c3daf6beb6d6ddec7697fee5f82d399ba42e2e7c068c22868756339001c299b265604c5f3859bbf5412098f1", @generic="4d5be23487c5e247690e3d023c99cd10755f1f2355c4c87a2331c639d2a88b167abb05c0a18c8d82c6a3e210caf2647a3ac7f7ef723c4a1d41d28fe7ad174ca51bcf0eaa869ae73f6c486b5e704e9bede9717834c3c48ae1cb92ec796c8892bd30c8ba7c23d49a7ea1382300c47f8bfbe446f5b4e530e4f279254842d7731ca7e85097a290c0bced2fab84a70e14ce35a6e0269cdc24508923a413164b81fb189b3d13582ff3ff52662f0516b9eebdc06411b01dd27f1449e1389abe6a4cd5102425403bb6c8ab0dda3d"]}, @nested={0x1bc, 0x25, [@typed={0xc, 0x89, @u64=0x7}, @typed={0xc, 0x3d, @u64=0x8}, @typed={0x54, 0x50, @binary="8e672c00a8f04390322e6dbc2230930e46e070cd599418487c445afebcc8a130e8313bf3cd97f6db45cf334fdf3f9b5ac7ef1d9c3644ea12edaf1ead454c9c7b184fc8deb62bc876db1b45ccfcf7"}, @generic="1303d0ba73122892b8261b3bf770ee3d5ef733a423409957b5f6d7231cd41c66146f5d7459e6df302716db009001e43480246ca9a7d6cf105f718c68aa6cfbfb28ef310e058a919a9c2959f74b6eb6dbcfd80fb0d5d4dbdb1acec8acf0126ea6b58813f0fb9af758f4e25b834cb9f81cf52cf54084", @typed={0x8, 0x3c, @fd=r1}, @typed={0x8, 0x74, @ipv4=@remote}, @generic="414efe7025c79996262eba7906f8869d9ab16c", @generic="da97bad2ff40c6b0c9eeb9bfa376df3c632ab650c6d07f7270d034d1273dd4d63d487a5200ca32c12685c52cbee991765af75a1739465422eda89dc7590a323849c3b5f7622e0c09aa2a0e951678463e861c812f7123ae91dd4d2a4bd9bf019fa6fb6fb7ee6128407b912c345142a0b7339cc1c28bdd75ee9a5ba301d9b8584c9cfa703ef1510fb7d4192ce7e54e4097dba92f1de4fc5aec2dd67c8c1d84abd76335379c0c500ad85761fea5", @typed={0x8, 0x37, @pid=r8}]}, @generic="babf10e441c6500ae84972d1d38f48126c4747f0ffe53423a3010aeca0d04c40a53afcef1fe71f2279be01f69b"]}, 0x4bc}, {&(0x7f0000003840)={0x11c8, 0x30, 0x300, 0x70bd2d, 0x25dfdbfc, "", [@typed={0x40, 0x28, @binary="8ed8cbc4cfaee8a4d3d6357204fde07de996caf71c11979f8c1d137c2917dcc8dcbd470d38fccfd331124b889540ce22409a67272ea04eecb2482090"}, @nested={0x1170, 0x5e, [@typed={0x14, 0x1c, @ipv6=@loopback}, @generic="32c2ea933f6a91661a37214307b358c842ac3d5d3312ed1a2fd2ac78997223190735d474b61961ff12e76b4fa5535985506a9d409d724af14ee5e8d284e6cb5081700c1a", @generic="c099c877bb25b61f608de108a896155a6658be7f3efcafef813c1bb7bec1c3d4908f2144b353b8b455456df9c3c05718f6d9e18d283e2c6f12b8e5bb78e0fc157916d809eeb0cc128b2ca8ab2300b0ec7d33260cbe5e476ed7a4db", @generic="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", @typed={0xa4, 0x70, @binary="0fa39fa730eb56ff1818f6eae47f26aa9af4b8ee2f796b53df4ffef95645a4f521049bf6128eeb9f151ec1335348b123b313110d09c269e90c131ec6d7975904f83bcaf629b5bf2cadb84c3845a40831c0b1507d072f77049d83b71bc13533c0ff20da96533164444b7246dfb9f02d59d769408ce1c33f47f9fd4641cea5ad83168fa19b195c4926ef2e4d2e587e221460ea1bcee19ee95efd8c6941cb"}, @typed={0x8, 0x94, @uid=r9}, @typed={0xc, 0x5e, @u64=0xffffffffffffb173}]}, @typed={0x8, 0x64, @uid=r10}]}, 0x11c8}], 0x7, &(0x7f0000004d00)=[@cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}], 0x40, 0x884}, 0x24000800) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r14 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$TIOCGPGRP(r14, 0x540f, &(0x7f0000000000)=0x0) fsetxattr$security_ima(r0, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x11, 0x2) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r14, 0xc0481273, &(0x7f0000000040)={[], 0x400, 0xffff, 0x3, 0x9, 0x7, r15}) sendfile(r1, r14, 0x0, 0x10000000000443) 17:02:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @loopback}, &(0x7f0000000040)=0xc) [ 2248.156982][T11320] mkiss: ax0: crc mode is auto. 17:02:21 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15be}, 0x28) 17:02:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2248.321724][T11332] XFS (loop1): Invalid superblock magic number 17:02:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:21 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15bf}, 0x28) 17:02:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x740000, 0x0, 0x0, 0x0) 17:02:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000040)={'veth0_to_bond\x00', 0x4}) [ 2248.449945][T11645] mkiss: ax0: crc mode is auto. 17:02:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x9, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:22 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c0}, 0x28) 17:02:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x5, 0x4000) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000540)) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000240)='net/rou\xb5e\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x4edb}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x1, 0x3, 0x8, 0x3fff80, 0x1ff, 0x100000001, 0x4, r5}, &(0x7f00000000c0)=0x20) sendfile(r2, r4, 0x0, 0x10000000000443) 17:02:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x80ffff, 0x0, 0x0, 0x0) 17:02:22 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x503001, 0x0) recvfrom$netrom(r0, &(0x7f0000000280)=""/126, 0x7e, 0x0, &(0x7f0000000300)={{0x3, @default, 0x3}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000a40)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-arm64-neon\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') fcntl$setsig(r3, 0xa, 0x3b) sendfile(r2, r4, 0x0, 0x10000000000443) ioctl$VIDIOC_S_FREQUENCY(r4, 0x402c5639, &(0x7f0000000200)={0x5, 0x7, 0x6}) ioctl$sock_proto_private(r2, 0x89ed, &(0x7f0000000380)="10d674cf114d7e94cefde4d6f7ef4827c3820f95886a2eb3f1d5405769079edfe74090e184f84ef93ef5b08ab72f5e9e65f0e1fdd08458021cd4de697825f9ab0f7d3f5bc0c67e27db1435baee55d64c0250ab02f2811d0adc42aca7807e66b480b32ca629ce00ffba6321e9d2cadc67ed5deafc1d226f7f2a") connect$ax25(r1, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x480, 0x140, 0x0, 0x0, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000400), {[{{@arp={@rand_addr=0x81, @local, 0xffffffff, 0xffffff00, @mac=@local, {[0x0, 0xff, 0x0, 0xff, 0xff]}, @empty, {[0xff, 0x0, 0x0, 0x0, 0xff, 0xff]}, 0x1000, 0x31f, 0x5, 0x10000, 0x42e, 0x100000001, 'ip6tnl0\x00', 'syzkaller1\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@random="ac382c549c46", @loopback, @rand_addr, 0x2, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@random="4b27e9dff044", @rand_addr=0x10001, @loopback, 0x4}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x6, 0xffffffff, 0x3}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000140)=[{{0x0, 0x7530}, 0x16, 0x401, 0x200}, {{0x77359400}, 0x16, 0xffff, 0x2784989}, {{0x77359400}, 0x0, 0x0, 0x800}, {{r5, r6/1000+30000}, 0x1f, 0x4, 0x9}, {{0x77359400}, 0x16, 0x8551, 0xfffffffffffffff7}, {{0x77359400}, 0x16, 0xdade, 0x81}], 0x90) [ 2248.940109][T11968] mkiss: ax0: crc mode is auto. 17:02:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r1, 0x0, 0x1000000000044b) write$UHID_CREATE(r2, &(0x7f0000000280)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000140)=""/130, 0x82, 0x868, 0x3ff, 0x2, 0x1, 0x1}, 0x120) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x5, 0x8000, 0x8001, 0x80, 0x8, 0x1000, 0x8}, &(0x7f0000000040)={0x8, 0x2, 0x2bfe80, 0x2, 0x4, 0x4, 0x1, 0x5}, &(0x7f0000000080)={0x5, 0x100000001, 0x3, 0xffffffff, 0xf70, 0x5, 0x81, 0x100}, &(0x7f0000000100)={r3, r4/1000+30000}) 17:02:22 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c1}, 0x28) 17:02:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:22 executing program 4: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15b2}, 0x28) [ 2249.110851][T12032] XFS (loop1): Invalid superblock magic number 17:02:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x940000, 0x0, 0x0, 0x0) 17:02:22 executing program 4 (fault-call:6 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2249.388014][T12523] mkiss: ax0: crc mode is auto. [ 2249.406085][T12523] FAULT_INJECTION: forcing a failure. [ 2249.406085][T12523] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2249.421085][T12523] CPU: 1 PID: 12523 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #37 [ 2249.429097][T12523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2249.429106][T12523] Call Trace: [ 2249.429142][T12523] dump_stack+0x172/0x1f0 [ 2249.429171][T12523] should_fail.cold+0xa/0x15 [ 2249.429192][T12523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2249.429215][T12523] ? ___might_sleep+0x163/0x280 [ 2249.429243][T12523] should_fail_alloc_page+0x50/0x60 [ 2249.429270][T12523] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2249.472846][T12523] ? __lock_acquire+0x548/0x3fb0 [ 2249.477794][T12523] ? finish_task_switch+0x146/0x780 [ 2249.483009][T12523] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2249.488745][T12523] ? trace_hardirqs_on+0x67/0x230 [ 2249.493784][T12523] ? pmd_val+0x85/0x100 [ 2249.497963][T12523] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2249.505421][T12523] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2249.511683][T12523] alloc_pages_vma+0xdd/0x540 [ 2249.516393][T12523] __handle_mm_fault+0x1dd4/0x3ec0 [ 2249.521787][T12523] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2249.527345][T12523] ? find_held_lock+0x35/0x130 [ 2249.532153][T12523] ? handle_mm_fault+0x322/0xb30 [ 2249.537114][T12523] ? rcu_read_unlock_special+0xf3/0x210 [ 2249.542678][T12523] handle_mm_fault+0x43f/0xb30 [ 2249.547463][T12523] __do_page_fault+0x5ef/0xda0 [ 2249.552243][T12523] do_page_fault+0x71/0x581 [ 2249.556760][T12523] ? page_fault+0x8/0x30 [ 2249.561013][T12523] page_fault+0x1e/0x30 [ 2249.565173][T12523] RIP: 0033:0x406d5d [ 2249.569083][T12523] Code: 0f 1f 44 00 00 c6 44 24 0e 06 48 c7 04 24 10 00 00 00 e9 56 ff ff ff e8 81 50 05 00 90 41 55 41 54 55 53 48 81 ec d8 1b 00 00 <48> 89 bc 24 08 01 00 00 48 89 b4 24 00 01 00 00 48 89 94 24 f8 00 [ 2249.588785][T12523] RSP: 002b:00007f5ef6836070 EFLAGS: 00010202 [ 2249.594866][T12523] RAX: 0000000000406d50 RBX: 00007f5ef6837c90 RCX: 0000000000000000 [ 2249.602848][T12523] RDX: 000000002000d000 RSI: 0000000000000005 RDI: 0000000000000006 [ 2249.610830][T12523] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2249.618812][T12523] R10: 0000000000000064 R11: 0000000000000000 R12: 00007f5ef68386d4 [ 2249.626794][T12523] R13: 00000000004c69bb R14: 00000000004dbf98 R15: 0000000000000007 [ 2249.655063][T12523] syz-executor.4 invoked oom-killer: gfp_mask=0x0(), order=0, oom_score_adj=1000 [ 2249.697987][T12523] CPU: 1 PID: 12523 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #37 [ 2249.705998][T12523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2249.716247][T12523] Call Trace: [ 2249.719562][T12523] dump_stack+0x172/0x1f0 [ 2249.723914][T12523] dump_header+0x10f/0xb6c [ 2249.728345][T12523] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2249.734162][T12523] ? ___ratelimit+0x60/0x595 [ 2249.738785][T12523] ? do_raw_spin_unlock+0x57/0x270 [ 2249.744104][T12523] oom_kill_process.cold+0x10/0x15 [ 2249.749246][T12523] out_of_memory+0x79a/0x1280 [ 2249.753940][T12523] ? lock_acquire+0x16f/0x3f0 [ 2249.758637][T12523] ? pagefault_out_of_memory+0xeb/0x11c [ 2249.764196][T12523] ? oom_killer_disable+0x280/0x280 [ 2249.764219][T12523] ? mutex_trylock+0x18e/0x1e0 [ 2249.764231][T12523] ? pagefault_out_of_memory+0xeb/0x11c [ 2249.764248][T12523] pagefault_out_of_memory+0x109/0x11c [ 2249.764260][T12523] ? out_of_memory+0x1280/0x1280 [ 2249.764280][T12523] ? lock_downgrade+0x880/0x880 [ 2249.764295][T12523] ? rcu_read_unlock_special+0xf3/0x210 [ 2249.764317][T12523] mm_fault_error+0x100/0x3a0 [ 2249.764341][T12523] __do_page_fault+0xc3a/0xda0 [ 2249.774320][T12523] do_page_fault+0x71/0x581 [ 2249.774337][T12523] ? page_fault+0x8/0x30 [ 2249.774352][T12523] page_fault+0x1e/0x30 [ 2249.774364][T12523] RIP: 0033:0x406d5d [ 2249.774380][T12523] Code: 0f 1f 44 00 00 c6 44 24 0e 06 48 c7 04 24 10 00 00 00 e9 56 ff ff ff e8 81 50 05 00 90 41 55 41 54 55 53 48 81 ec d8 1b 00 00 <48> 89 bc 24 08 01 00 00 48 89 b4 24 00 01 00 00 48 89 94 24 f8 00 17:02:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xa, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:23 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c2}, 0x28) 17:02:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") gettid() r4 = fcntl$getown(r0, 0x9) r5 = syz_open_procfs(r4, &(0x7f0000000180)='net/fib_trie\x00\xe2\xa6d\x87\x86I\x8aZ\x8d\xe8\xd7 i\xc4\xaf_T_#b\xa7y\x83\xd7\xca\xec\xe7\x13\xc6\xd5\xa1\xd2\x9c)\xac\x95\x94i\x7fp8\v\xc7eKj\xc5:\xf4\x1aj\x00\x1b6\x8e\xa8\x11\x8d\xc9f\xc2\a\xea\x83\xe5\xab\xc0}\xa9\xf2\xd1\xe4\\:\x97\xe8\xf5\x1b\xa0\x80\xb0\x14+\xd0\xa99\xaaO') sendfile(r2, r5, 0x0, 0x10000000000443) [ 2249.774398][T12523] RSP: 002b:00007f5ef6836070 EFLAGS: 00010202 [ 2249.774409][T12523] RAX: 0000000000406d50 RBX: 00007f5ef6837c90 RCX: 0000000000000000 [ 2249.774417][T12523] RDX: 000000002000d000 RSI: 0000000000000005 RDI: 0000000000000006 [ 2249.774433][T12523] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2249.876559][T12523] R10: 0000000000000064 R11: 0000000000000000 R12: 00007f5ef68386d4 [ 2249.884621][T12523] R13: 00000000004c69bb R14: 00000000004dbf98 R15: 0000000000000007 17:02:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xa07000, 0x0, 0x0, 0x0) [ 2249.963204][T12523] Mem-Info: [ 2249.973858][T12523] active_anon:225744 inactive_anon:190 isolated_anon:0 [ 2249.973858][T12523] active_file:13474 inactive_file:44175 isolated_file:0 [ 2249.973858][T12523] unevictable:0 dirty:413 writeback:0 unstable:0 [ 2249.973858][T12523] slab_reclaimable:21493 slab_unreclaimable:108226 [ 2249.973858][T12523] mapped:58779 shmem:245 pagetables:4257 bounce:0 [ 2249.973858][T12523] free:1105822 free_pcp:481 free_cma:0 17:02:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x82000) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SCSI_IOCTL_DOORUNLOCK(r4, 0x5381) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") getpid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000180)='net/route\x00') sendfile(r3, r6, 0x0, 0x10000000000443) [ 2250.055913][T12641] XFS (loop1): Invalid superblock magic number 17:02:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}}, [0x5, 0x5, 0x400, 0x1ec, 0x1, 0x0, 0x2, 0x6, 0x3ee, 0x1, 0x4, 0x7fff, 0x101, 0x101, 0xfffffffffffffff7]}, &(0x7f0000000280)=0x100) sendmsg$inet_sctp(r1, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="2c13151166a34793da681881f9002b25f0230ca1a4231a00300ae3c1864d7f69566604008e47865952f7618e2031f91e2b8a1e517ad0f4821a7472d3b360f5c1d7ef9a17ceddc085f25d0a455e558b9791a5f44c363e34c831c0c5e801ecc85b916b6a8eae49afc35465224124bafe", 0x6f}, {&(0x7f00000000c0)="943af984d799c98d4e1a4f257d25f9c2d15b01bb66a10bc8fec976811038", 0x1e}], 0x2, &(0x7f00000002c0)=[@init={0x18, 0x84, 0x0, {0x0, 0x7fffffff, 0x8000}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0x81, 0x4, 0x20, 0x8, 0x3f, 0x7f, 0x89, r3}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x80000001}}, @authinfo={0x18, 0x84, 0x6, {0xe36}}], 0x78, 0x800}, 0x0) 17:02:23 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c3}, 0x28) 17:02:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xb05000, 0x0, 0x0, 0x0) [ 2250.160999][T12523] Node 0 active_anon:898832kB inactive_anon:760kB active_file:53760kB inactive_file:176700kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235116kB dirty:1648kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 342016kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2250.282211][T12523] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 17:02:23 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c4}, 0x28) 17:02:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000000)='schedstat\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) [ 2250.358712][T12523] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2250.451383][T12523] lowmem_reserve[]: 0 2553 2555 2555 [ 2250.467623][T12523] Node 0 DMA32 free:627640kB min:36232kB low:45288kB high:54344kB active_anon:898800kB inactive_anon:760kB active_file:53760kB inactive_file:176700kB unevictable:0kB writepending:1648kB present:3129332kB managed:2617996kB mlocked:0kB kernel_stack:11264kB pagetables:16880kB bounce:0kB free_pcp:1940kB local_pcp:1220kB free_cma:0kB [ 2250.514259][T12523] lowmem_reserve[]: 0 0 2 2 [ 2250.522750][T12523] Node 0 Normal free:12kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2250.627857][T12523] lowmem_reserve[]: 0 0 0 0 [ 2250.632643][T12523] Node 1 Normal free:3782300kB min:53624kB low:67028kB high:80432kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2250.665993][T12523] lowmem_reserve[]: 0 0 0 0 [ 2250.670635][T12523] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 2250.691242][T12523] Node 0 DMA32: 178*4kB (UME) 640*8kB (UME) 532*16kB (UME) 307*32kB (UE) 289*64kB (UE) 5*128kB (UM) 1*256kB (M) 0*512kB 2*1024kB (UM) 3*2048kB (ME) 142*4096kB (UM) = 633384kB [ 2250.709212][T12523] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 2250.722570][T12523] Node 1 Normal: 63*4kB (UM) 234*8kB (UE) 245*16kB (UE) 64*32kB (UME) 16*64kB (UME) 10*128kB (UE) 8*256kB (UME) 5*512kB (UM) 3*1024kB (ME) 0*2048kB 919*4096kB (M) = 3782300kB [ 2250.740929][T12523] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2250.750963][T12523] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2250.760741][T12523] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2250.770873][T12523] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2250.780638][T12523] 57908 total pagecache pages [ 2250.785802][T12523] 0 pages in swap cache [ 2250.790177][T12523] Swap cache stats: add 0, delete 0, find 0/0 [ 2250.796871][T12523] Free swap = 0kB [ 2250.800690][T12523] Total swap = 0kB [ 2250.804908][T12523] 1965979 pages RAM [ 2250.808826][T12523] 0 pages HighMem/MovableOnly [ 2250.813596][T12523] 339406 pages reserved [ 2250.818295][T12523] 0 pages cma reserved [ 2250.822486][T12523] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=11828,uid=0 [ 2250.838050][T12523] Out of memory: Killed process 11828 (syz-executor.4) total-vm:72448kB, anon-rss:6296kB, file-rss:35860kB, shmem-rss:0kB 17:02:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:02:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:02:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xb, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:24 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c5}, 0x28) 17:02:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1000000, 0x0, 0x0, 0x0) 17:02:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000080)='net/arp\x00') sendfile(r1, r4, 0x0, 0x10000000000443) 17:02:24 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c6}, 0x28) [ 2251.040803][T13194] XFS (loop1): Invalid superblock magic number 17:02:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000ac0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes),wp512)\x00'}, 0xfffffffffffffd75) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/219, &(0x7f0000000080)=0xdb) sendfile(r0, r0, &(0x7f0000000040), 0x0) r2 = getuid() ioprio_get$uid(0x0, r2) r3 = gettid() r4 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0x0, r1, 0x0, 0xb, &(0x7f0000000200)='/dev/audio\x00', 0xffffffffffffffff}, 0x30) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000980)={&(0x7f0000000380)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000540)="66859c746ffd129c5741c4f1284709f657d21e79d7a69ca06c21f6536928407fb060a06ab34f06c32620d34861bd0712ad1307b5d090c4e5e73861ed2855038f0c7a5540c65e9da05f091e7ab2774baae407515c5d6b2088eb689a6e6f8987f721c2ff19bd41ef138eb62b7de4d2fd7bf83f2f95638d98589f0dd2c55604a2a9f59b159eacf981729323e429d9cfc94100ba38ebbd1c40b0fc665c570fb64ecd5cbafedb417265c0c78ae3cf944c4172097c107fa946fbb78e8003acb3e850eb8277f3d71573055b7d94b07ada114ea30492", 0xd2}, {&(0x7f0000000640)="a8954c0b3b5cabfb05ad3e7c365be6cc61dd9438a27d2759d8ccb3a2fd48e914f697fb6ffc2cb899eccfc4ecffcd520bf5b4667cc42926d4f7d65599c6e7414a0c0e73fc1c4070fd29281ecf3efe1aedf9b156f4a2ac8332b30da4d8e290f6a1475efecc63748f0a9a8c3c07482bdaab26f2a86b78c872c3977de40ec878f0cfa41deabb9b1568e390b903108af57bb13da3e1d6138f4692a74139fc9b9ebfec19c94e3480bdc267652d67e2c7f92a7f7b0b48b67bb7023694e88ef0eddf93a01b419a33bbdd99d5cc487d1bcb578396349c35eed8dd62a4dc7e39c8f25c08f1a7eadf20caafc9d3d789ddb81d6c68fb7f7178db", 0xf4}, {&(0x7f0000000400)="890509b324c3d7be40f8e8524c82c885f896ae7192d320e09abac1e73236af432df956e485bce44a554799b565b755828e5ebef38375ae24ed9a9308f99db27f3cdcd2db389171ffd2a72fdb2a79", 0x4e}, {&(0x7f0000000740)="1999457d943e274a0552f92a4bd3f373e28445c54015ffb97a3feee8041c1d4d0e452b6cbe2d4fbea952a2a2763a8b8b459263f219eac61275a9eeda1e3892c2aa6ae46aab3ce7eee141752c808c3eb0ed8710d62f04cc214edd1003cd67f96fd227f19a9d06510ef2ddf06e08c91f806f77da7ae97dcabb4360f2801769df583923f508462ea6f13dbca1a352368f1121772d846d27b5eeb6bc889d88474ceb2cd39ffcc70b1a4ae1ba7895", 0xac}], 0x4, &(0x7f00000008c0)=[@rights={0x30, 0x1, 0x1, [r1, r1, r1, r0, r1, r1, r0]}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @cred={0x20, 0x1, 0x2, r3, r2, r4}, @cred={0x20, 0x1, 0x2, r5, r2, r6}], 0x88, 0x4008044}, 0x10) r7 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)="2395f87c688d91c551a55d4452ab582119b475f6603e07f164ea18df6701d710df8002c936cff365b7880ec1d5d38af4291640695a7c9cf9c8f773142d856fc66061a5d69d11615fc4feac0b00e015d8e72cfb74210bb954358b8cde49e56458312f5561e486908f10d66f27e17fbcfe9b8edebf4d1a3b0c4969dd41b77d026f4818c028b9b4abf379b3daca9c4aaa767ff43ddb76054dccc8ebfa96a20916657879600325e603423c9b4513ef577bd52b7c244f194adc522163394160cb69e2754df00433d57ebc9d23efce8d23a6c51851e62a73e781fe5036") r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r7, r8, 0x0, 0x10000000000443) 17:02:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0x0) 17:02:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') writev(r2, &(0x7f0000002640)=[{&(0x7f0000000000)="e0070ebb3e7df1a6d987c5e5257bd2ce3dd194f513424965287465646a679f55a695c80574f2ddeca0f81cd617e0e13e314ddabaff3d01c4b1bfc698035d09509911d4287858c4a831b5e1ed5f5a6055037e133be77ea4d55ae3cd4b0a35e693b3fa0cd411953e5d42ce44c9190f1a", 0x6f}, {&(0x7f0000000080)="d0f2de32f0e95fb5370d", 0xa}, {&(0x7f0000000140)="d6c7ce6bf554cefd65ef93dc9030916e81f98879c94f27f621c0f25d3fd7ddbb897e2e0c467f01f86409741a0b556519327379f9e83e4d778a552e0f713eda79b58746b5c388eec59bed30aac6b6ff2d17dc19cd2fdf97085d043bb7b6e52aff099bcd98b659fae02d54472ae48a3ad45c40ce26e2fc6aee21884accbd61ee4aabf989a3e14617ec20d6b9a6312da8b724d20611efbd5fd827fe4134ca74fe1e8d10a7d7c0e23b13f93dcf29d4bc95f70ffb5cb645f15e9eddfae71b0a2e26980511358f9400bd6ef9f9059d1f9ca07435f768f2681d000fdceeec82a335a0", 0xdf}, {&(0x7f00000000c0)="3a7c93066495d4f9f151490189207c13cad95118de0a2103a756cb12a46aa87c952a39b78d9245498218df869558a9c3afe131cbf5a1998f9c2871f9", 0x3c}, {&(0x7f0000000280)="8dc1edc5331462ea3b2bf278756685cd174894cf4e6a85dd0fc9f1c4fe264a766c0b62ee03dfce279e80feb8abe82ab45b2d2febe930beb8d45bb754ca25f7ab9a350c39f8f4707d32a786b89226b9fc605fe353f40882a38f53c624ae68a3f3f08e7a88e2d7eb2083e85950a2f6e202f442c4fccbeabeeba2c0b049e0d8c624b8d5910cb1bd51b8b55ac6b6ae6d4fe641fd215a2c2b24a9273c51f278cdaedc56ed14286cdf3a", 0xa7}, {&(0x7f0000000340)="0b7fa52fb6ce9098b98479eca46ef22d12", 0x11}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000000380)="22ccd2126c6d76e13811148aa7a7d3d0664bde2a890e44cdfd8993935183d3986f113a93ac1e57623e678864d99b4e11a75a9b60abfff1753f60b3b6e87b47d8c3c83b78279daabfcf7e30cd3b6b904507da588cec104a1da8a0d252f5f7c828c1bd30bd2a2f2cddca78a95b75e0ed1fb41f8638e103", 0x76}, {&(0x7f0000002540)="962a9a6b3f6654ad91cc026daa406417b43e1903a7b68295d0c0c8e5e8ec13d6073c0d971629ea9f38c75d780c025adf2832a4284bb0b289c37855e5ea30f16a8efe8d0d6a63f9da26e8a346cc60fa020a6547e66e1ef668796cf28b6933e1b988376d0eb072ff49557851d09816d7d70de363edec67652b99dea94d10b0eec4227b29d0b862bfe4702e85eb59b447cf246928805b0c5d3105222e5dbcd41d978f657ba33b13f86dc931973357a983ce89f6472688a4ee0fa03cf662a0b56d9539a520850eab7ed155a5fb48f7ab7e09d1a38500d3df61a01d752590e0670ad06c327fd70cdc1d", 0xe7}], 0xa) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:24 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c7}, 0x28) 17:02:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1000040, 0x0, 0x0, 0x0) 17:02:24 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c8}, 0x28) 17:02:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000000)=0xb4, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') gettid() r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="1fca2487b879e8d9f29298939b2dcfdaf32d65d03b9a87f83413", 0x1a) sendfile(r1, r2, 0x0, 0x10000000000443) [ 2251.394560][T13524] mkiss: ax0: crc mode is auto. 17:02:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xc, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendto$unix(r3, &(0x7f0000000040)="09d093daacdad38eda428b1b27122e40dbae1ff8150e1a1e11b13770d6531e9ef9ae48f0878924b46bfab5e979d03d963cc4617a17dadccfb764ccb0a20a1c9984d356337e8624d8126e1822f37e9566a8601e0afa3b9af48957e6a12ab215f535522eb60270ebca4fcd4c4d390ec96eb1e7b52ac7a86b8cb99dec3ab5db186a9ef92508a5f35a45c8317a9ae84233a07da882609bc5d6ca3beeea07871f70ffc07136c627806a36fc99bf", 0xab, 0x800, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:24 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15c9}, 0x28) 17:02:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x3, 0x0, 0x0, 0x0) 17:02:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1000080, 0x0, 0x0, 0x0) 17:02:25 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ca}, 0x28) [ 2251.853753][T14015] XFS (loop1): Invalid superblock magic number [ 2251.881940][T14088] mkiss: ax0: crc mode is auto. 17:02:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="afd9853bb99feb2ecd029ff95c9d3753ca826e9d3ff37a834e54129a1059962bf2319c77b590a5fb8c89cda699272bef135ac158ad89e5ddfcf0d8dc62", 0x3d) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f00000000c0)) 17:02:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000040)={r4, 0x12}) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:25 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15cb}, 0x28) 17:02:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x10000c0, 0x0, 0x0, 0x0) 17:02:25 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15cc}, 0x28) 17:02:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x1, "b50d445dd6d994dc"}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x2}}}, 0x84) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 17:02:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xd, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x4, 0x0, 0x0, 0x0) 17:02:25 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15cd}, 0x28) 17:02:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2040, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$SIOCX25SSUBSCRIP(r3, 0x89e1, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x9, 0x14c03e30}) sendfile(r1, r3, 0x0, 0x10000000000443) [ 2252.373489][T14707] mkiss: ax0: crc mode is auto. 17:02:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000040)=0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/current\x00') ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000140)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r4, 0x0, 0x10000000000443) 17:02:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1010000, 0x0, 0x0, 0x0) 17:02:25 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ce}, 0x28) [ 2252.532701][T14774] XFS (loop1): Invalid superblock magic number 17:02:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x5, 0x0, 0x0, 0x0) 17:02:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) accept4$rose(r1, 0x0, &(0x7f0000000000), 0x80800) 17:02:26 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15cf}, 0x28) 17:02:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r2 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r2, 0x0) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r2, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) r4 = msgget(0x2, 0x231) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) r8 = getgid() fcntl$getownex(r3, 0x10, &(0x7f0000000200)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f00000003c0)={{0x2, r5, r6, r7, r8, 0xd3, 0x6}, 0x5, 0x0, 0x6, 0x800, 0x9, 0xfffffffffffffffb, r9, r10}) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) syz_open_dev$vivid(&(0x7f0000000440)='/dev/video#\x00', 0x0, 0x2) r11 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r12 = socket$inet_udplite(0x2, 0x2, 0x88) msgget$private(0x0, 0x40) ioctl(r12, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r13 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r11, r13, 0x0, 0x10000000000443) 17:02:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x2000000, 0x0, 0x0, 0x0) 17:02:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xe, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2252.882127][T15211] mkiss: ax0: crc mode is auto. 17:02:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0x6, 0x3e51}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x3, 0x8000, 0x7fffffff, 0xfffffffffffffff9, 0x9, 0x1, 0x6, 0x522fd476, 0x7, 0x1, 0x9}, 0xb) 17:02:26 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d0}, 0x28) 17:02:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) pipe(&(0x7f0000000000)) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) [ 2253.109373][T15350] XFS (loop1): Invalid superblock magic number 17:02:26 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d1}, 0x28) 17:02:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x6, 0x0, 0x0, 0x0) 17:02:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x3000000, 0x0, 0x0, 0x0) 17:02:26 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d2}, 0x28) [ 2253.353355][T15705] mkiss: ax0: crc mode is auto. 17:02:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x1a) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xa2400, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)=0x7fffffff) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r4, 0x0, 0x10000000000443) 17:02:26 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d3}, 0x28) 17:02:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x4000000, 0x0, 0x0, 0x0) 17:02:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x10, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:27 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d4}, 0x28) 17:02:27 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r1, 0x0, 0x10000000000443) 17:02:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x7, 0x0, 0x0, 0x0) 17:02:27 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d5}, 0x28) 17:02:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x1, 0x45, 0x0, 0x463, 0x3, 0x6, 0xad6, 0x97, 0x38, 0x157, 0x7, 0xd1d, 0x20, 0x1, 0x5, 0x9, 0x9}, [{0x70000007, 0x2c, 0x101, 0x7f, 0x4, 0xfa3, 0x7, 0x5}, {0x60000007, 0x7ff, 0x80000000, 0x1, 0x2d, 0xba53, 0x7, 0x5}], "775b327b66605de6e68280ef171c7cc1f44bd549a757c6a73be847d3abf00314c49557d1a9a55acf445f2fbe94b105ea60f44024988b81a949bc697b36845e7fa513b1ce58218a23ceed8815ed436a8317e4d6c1e481940463a9336e57124b5069295462f08052c298c4e00cf7e4272e0f2edd5509e60addf4ec1d3a5e603852549374f4f0586bc637b0621aedfe3e72b71c379b6633276f026ac0b45295b0053018a001f30512b398"}, 0x121) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) [ 2253.836966][T16191] XFS (loop1): Invalid superblock magic number [ 2253.865955][T16306] mkiss: ax0: crc mode is auto. 17:02:27 executing program 2: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x20e, 0x80800) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000080)=0x4dba7da4, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x5000000, 0x0, 0x0, 0x0) 17:02:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0x100, 0x0) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000540)="97e1fb7fed02af991cbfb86bd98ded", 0xf) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x34, 0x4, {"2f6011d2da8e03b048255079ae8f84860966ef51fec37a2bb071ba7b"}}, {0x0, "80d4a94cf7038b17beb322c5ea3ee2bb8d32d0f3b5ee5b616b177a2927646a8e98225b"}}, &(0x7f0000000080)=""/6, 0x59, 0x6}, 0x20) sendfile(r2, r4, 0x0, 0x10000000000443) 17:02:27 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d6}, 0x28) 17:02:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x9, 0x0, 0x0, 0x0) 17:02:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x18, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:27 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d7}, 0x28) [ 2254.302559][T16820] mkiss: ax0: crc mode is auto. 17:02:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x6000000, 0x0, 0x0, 0x0) 17:02:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x0, "61a78d44e104fecb"}) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:27 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d8}, 0x28) [ 2254.507054][T16932] XFS (loop1): Invalid superblock magic number 17:02:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xa, 0x0, 0x0, 0x0) 17:02:28 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15d9}, 0x28) 17:02:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x101, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@empty, 0x0, 0x2, 0x3, 0x8, 0x4, 0x4}, &(0x7f0000000180)=0x20) r2 = accept4(r0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1001}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r3, 0xd6}}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/129, &(0x7f00000000c0)=0x81) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r2, 0x0, 0x10000000000445) [ 2254.741478][T17416] mkiss: ax0: crc mode is auto. 17:02:28 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15da}, 0x28) 17:02:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x7000000, 0x0, 0x0, 0x0) 17:02:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440), 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x2000000, &(0x7f0000000540)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, r3}}, {@cache_loose='cache=loose'}], [{@euid_lt={'euid<', r4}}, {@dont_hash='dont_hash'}, {@hash='hash'}]}}) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x9, @local, 0xe73}}, 0x80000001, 0x100000001, 0x0, 0x5fb, 0x64}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r5, 0x0, 0xfffffffffffffff9, 0x8, 0xa3f, 0x5}, 0x14) r6 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f0000000280)={0xd43a, 0xf, 0x4, 0x40, {}, {0x5, 0xd, 0x8, 0x6, 0x5, 0x6, "6ae22403"}, 0x0, 0x4, @planes=&(0x7f00000001c0)={0x8, 0x7f, @userptr=0x24d}, 0x4}) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r7, 0x0, 0x10000000000443) 17:02:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x23, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x6, 0x2, 0xfffffffffffffff7, 0x0, 0x1, 0x68}) 17:02:28 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15db}, 0x28) 17:02:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xb, 0x0, 0x0, 0x0) 17:02:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8300, 0x0) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x24, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2255.222719][T17992] mkiss: ax0: crc mode is auto. 17:02:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x7000080, 0x0, 0x0, 0x0) 17:02:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200280, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000040)={0x1, 0x1, [0xffffffff, 0x401, 0x1, 0x4, 0x6, 0x7, 0x9, 0x80000000]}) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:28 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15dc}, 0x28) 17:02:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x26, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:28 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15dd}, 0x28) 17:02:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x7) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') fsync(r2) sendfile(r2, r3, 0x0, 0x4) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x3e3f5ad51364db93}, 0xc, &(0x7f00000000c0)={&(0x7f00000026c0)=ANY=[@ANYBLOB="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"], 0x2138}, 0x1, 0x0, 0x0, 0xc080}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x3) 17:02:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xd, 0x0, 0x0, 0x0) 17:02:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x3c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:29 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15de}, 0x28) 17:02:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x8000080, 0x0, 0x0, 0x0) 17:02:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="44f5cf7c", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) [ 2255.731150][T18482] mkiss: ax0: crc mode is auto. 17:02:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) pwrite64(r0, &(0x7f0000000000)="28f3c92374e5d07c879fdd55444aa6d792d26fe156e71e79b76f9e5bb8793b670fee1321316e189e5c636910d621e88f5c03b75222f535440fa83bc67a7428c040df7cfaa450b2fc61fd334b960e2e1f96bd57591b18faa758273c33de495b7af06ef9ebc5f8047458063d2098b74bb5", 0x70, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:29 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15df}, 0x28) 17:02:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x48, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:29 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e0}, 0x28) 17:02:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000000)={0x8, 0x0, [], {0x0, @reserved}}) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x14, 0x0, 0x0, 0x0) 17:02:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x9000000, 0x0, 0x0, 0x0) [ 2256.075946][T18736] XFS (loop1): Invalid superblock magic number 17:02:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000000)=0x3ff) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:29 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e1}, 0x28) [ 2256.258579][T19050] mkiss: ax0: crc mode is auto. 17:02:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x6) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000040)={0x4, 0x1, @start={0x10000, 0x1}}) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r2, 0x0, 0x10000000000443) 17:02:29 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e2}, 0x28) 17:02:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xa000000, 0x0, 0x0, 0x0) 17:02:29 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e3}, 0x28) 17:02:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x4c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) getsockname$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c) 17:02:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0xfffffffffffffe5e) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x10000, 0x6, 0xffffffffffffffff, 0x0, 0x6, 0x845c, 0x7, 0x4ce9, 0x8001, 0x1000, 0x4}, 0xb) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x50, 0x0, 0x0, 0x0) 17:02:30 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e4}, 0x28) [ 2256.718869][T19548] XFS (loop1): Invalid superblock magic number [ 2256.753503][T19576] mkiss: ax0: crc mode is auto. 17:02:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000000)={0x4, 0x7f, 0x400}) 17:02:30 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e5}, 0x28) 17:02:30 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9cc, 0x240) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) pipe2(&(0x7f0000000040), 0x0) 17:02:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xb000000, 0x0, 0x0, 0x0) 17:02:30 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e6}, 0x28) 17:02:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xc0003) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x4f, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xc0, 0x0, 0x0, 0x0) 17:02:30 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e7}, 0x28) [ 2257.244917][T20217] mkiss: ax0: crc mode is auto. 17:02:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={r4, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0x6, 0xffff, 0x6, 0xfffffffffffffffb}, &(0x7f0000000080)=0x98) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r6, 0x0, 0x10000000000443) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000200)={0xfffffffffffff724, 0xfffffffffffffbf4, 0x202, 0x0, 0x0, 0x3, 0x2, 0xfff, r5}, 0x20) 17:02:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xd000000, 0x0, 0x0, 0x0) [ 2257.363912][T20247] XFS (loop1): Invalid superblock magic number 17:02:30 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e8}, 0x28) 17:02:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xe0, 0x0, 0x0, 0x0) 17:02:31 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15e9}, 0x28) 17:02:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x14000000, 0x0, 0x0, 0x0) 17:02:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="64adf5d9f7", 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000000)=0x3, 0x4) sendfile(r1, r1, 0x0, 0x10000000000443) [ 2257.715242][T20681] mkiss: ax0: crc mode is auto. 17:02:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80804000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="d62527bc2acfbfc0decadff3ebc6a0010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1a0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r5, 0x0, 0x10000000000443) 17:02:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x52, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:31 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ea}, 0x28) 17:02:31 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15eb}, 0x28) 17:02:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f0000000080)={r3, 0x1}) 17:02:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x300, 0x0, 0x0, 0x0) [ 2258.060747][T21039] XFS (loop1): Invalid superblock magic number 17:02:31 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ec}, 0x28) 17:02:31 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f0000000080)=@alg, &(0x7f0000000140)=0x80, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setownex(r2, 0xf, &(0x7f0000000040)={0x3, r4}) 17:02:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x19000080, 0x0, 0x0, 0x0) 17:02:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = syz_open_procfs(r2, &(0x7f0000000040)='stat\x00') write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="210000000300000000000000000000000200000000000200000000000000000000"], 0x21) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fallocate(r3, 0x20, 0xc99, 0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r4, 0x0, 0x10000000000443) [ 2258.249956][T21312] mkiss: ax0: crc mode is auto. 17:02:31 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ed}, 0x28) 17:02:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x60, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1a000080, 0x0, 0x0, 0x0) 17:02:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000000)={[{0x9, 0x7fffffff, 0x9, 0x6, 0x9, 0x80000000, 0x8000, 0x20, 0x100000000, 0x109, 0x1, 0x81, 0x4d7c}, {0x3, 0x200, 0x0, 0x1, 0x80000000, 0x2, 0x7fffffff, 0x1, 0x860, 0x10001, 0x3, 0xff, 0x100}, {0x8, 0x1, 0x7f, 0x8, 0x100, 0x1, 0x0, 0x0, 0xfffffffffffffffb, 0x300, 0x0, 0x1, 0x52}], 0x2ab00000000}) 17:02:31 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ee}, 0x28) 17:02:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x500, 0x0, 0x0, 0x0) 17:02:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r3, 0x6}}, 0x10) accept4(r0, 0x0, &(0x7f0000000140), 0x800) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r5, 0x0, 0x10000000000443) 17:02:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x68, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2258.719291][T21772] mkiss: ax0: crc mode is auto. 17:02:32 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ef}, 0x28) 17:02:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r2, 0x10, &(0x7f00000001c0)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f0000001840)='./file0\x00', 0x8, 0x2) sendmsg$nl_generic(r1, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x12e4, 0x32, 0x100, 0x70bd2a, 0x25dfdbfe, {0x6}, [@nested={0x24, 0x29, [@typed={0x8, 0x7c, @u32=0x5}, @typed={0x4, 0x76}, @typed={0xc, 0x56, @u64=0x7fff}, @typed={0x8, 0xa, @uid=r3}]}, @nested={0x14, 0x5d, [@typed={0x8, 0x1d, @uid=r4}, @typed={0x8, 0x5d, @u32=0x8000}]}, @nested={0xc, 0x8f, [@typed={0x8, 0x46, @pid=r5}]}, @generic="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", @generic="4330a9d19265aa8da6", @generic="13c1500cc8258a24136e89f007280604cf99b2c53470600faed5126f0834f3779c0af6659266e66571e67868", @nested={0x10c, 0x26, [@generic="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", @typed={0x8, 0x6f, @u32=0x2}]}, @nested={0x10c, 0x24, [@typed={0x8, 0x5, @uid=r6}, @generic="d2d5872cc3b0f7d467c57bac6cc262087ddb940f4a3c6bcd7efd603e99f6744c5d986ad03ab5491b40c3033ea7a925cb338eb6b727571239ef1ffb540c2a19a3e98219a903e6ece3fe3ff2ba5e25d1f005d5638c673cd2aff8ef225e053382ff719c1e3c92fe16243865867f2a7a1813981944e53e46521f22809100c8175faace5c350b0a60abd98759bf3219c0204f59d63505f173d91a", @generic="a9f2f7972aa4e48d73025ece68375bbd0205e8bc54019f33e73dd579b3e6988694acbd3f2a938429860e1830ea9a8b4d47dbce7e046c625983a69d6a9aecb7900c6920b1647a17be14b608c6ce0e81f716668bf250450abab39b6c4d54b915882334e72f5139"]}, @generic="cf632c6f6444d0e68697e00e2b38bbec9ea9285f1143", @generic="b2750571abba940c0fac0b1c22aac9e88e64e3699d0a5f378c35e64f8ceab20955c796d9bc15"]}, 0x12e4}, 0x1, 0x0, 0x0, 0x40800}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000400)) sendfile(r1, r2, 0x0, 0x10000000000443) prctl$PR_GET_TIMERSLACK(0x1e) 17:02:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1d000080, 0x0, 0x0, 0x0) 17:02:32 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f0}, 0x28) 17:02:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x6c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x600, 0x0, 0x0, 0x0) 17:02:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f0000000000)=0xfffffffffffffff7) 17:02:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket(0x8, 0x80002, 0x2) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x21, 0x4) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000100)=0x0) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000140)=r3) sendfile(r1, r1, 0x0, 0x10000000000443) getrandom(&(0x7f00000002c0)=""/19, 0x13, 0x3) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x2, 0x4, [0x101, 0x9, 0x101, 0xffff]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r4, 0x3}, &(0x7f0000000280)=0x8) [ 2259.111427][T22297] mkiss: ax0: crc mode is auto. 17:02:32 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f1}, 0x28) 17:02:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x70, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:32 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f2}, 0x28) 17:02:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="64f5d9f7", 0xfffffffffffffeeb) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000540)={0x2, 0x0, 0x2080, {0x5001, 0x106006, 0x2}, [], "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", "ea3d84f994d7e90fda517c5bffdc18cac68e9162be8303aef5a044e1a95bbc1f16b2ee473151b234a171d4e90824a6f60ac248da113ac0647662c5c8a5d484723a68069e81bd5f1d7a62d2e4e055416f586f10fdc25768b9d037e14da57c7d8fe1a33a0c1a9a75e2a83187a40fda28e21869ac563f76605ea4cc729bd142a8760cb13cc6c796c957f960aa4b262d12787ff8feba17aec527c227ea620dedfd90cd245fd10ecf2b71d89362373da01936e128d77b4a4970f09ddcfe4b9c322532cbe418bad86d8760c7d984a3a79e753db2979cbb0ea47d9d116a99f408605743d1e8ae243ae5f14ba0b70a0a21bda1dcdbfd55d5d278c06a6dc6ceecb72affd4e86b2d306d936b254211da2a2012701b8eb156f2a6c7af3c61b84c0a8e99b50b9d195ebdaa057b85127a8019265019df52b38694cdc122b8dc80138738bb527adcb25b33a8e16aa25887295962cb45aa9160f72018713ef339e5a9ca86d4ddad1b15b6c7eb1b3b6587132e9fb2d183da23bcb6f9e364bc5ce0c7b3b1db327bcf490c2e01d98d2ca4675515bcd8e7b158dde0dfc53797072542ede571247d408ff1f3d079a6d2d481546cd9f87fcfb8e33e896f88d4c18cd7f2114899f70e3dccdb9d4c82610ab95cbe304fc4c1d995b60bdb083e573eb94e8c9f106c03582d5a68e05b543ae8b3a29aaf692ae00c2f320f1d4752475336e903d604f45270e04c9b4b92990627de1486773535a39df406c5f201622344f6c8ef4fffa59745cdbc1924019695ac15e568556364a4b472fec9d28408eb2f85e9e36562065cc79ec451308487e7a512072a3de5e001f084566fd07eb085b97b63ed5d7087c13d3130e7155a8cf701811944b541a9a69f9ea33cac78744befc93106ccf5d8fa6ef1998d1103e84a95985dcdb5b0bcd58128869192e73f3c9af2a2072d1eba915d5aecc0e47e618397b5828714d2c5c665ed99fe01f192d00f8ca5b935ba7e74fd5f99867896892349a434087ab658741ff0563587f38cf8c2685d2930cb21076a4fa26747a1cfd52196b3ae37ea369915d0ad53679a7303ff1075c985127718dd9dfc566fee562173c40f7d650e41946ca6c27473c6dce376187bf084c2d168c9cfbfeadeaddacfaaa4bea174f2a6440c838053b5df103b134a275001496bc4fcf843e678f6bfeddd7a26a0ee7083c4fea37ac1a6065700a7107fcdf9299c0b00c46cc19c00eb43f0debe75c787919a3258bfe13e080153a63de2d190c0cf425cab3bbc9a6a2279c674dcab87e51b28144e434c14a6d1a96d4e75dee13ce97727fb0439edc58f21a63d4a2930868186d607ec4cb80497d3c18aee6831de5899a31309afb4c9ddae0c7413b9e7d46d50f7d782553c727aeddfa685fcbb2b918aefef3a636488cd1a2466d0b33eeda408b8c22d82470dd967dc46d8a093a80fb4daa5c1a123e14145d88164e2a27d9146d0c0db86c5f8c217ae4ab720c6fe054fd1388260c1f528e69cd3d6ab404984abfd7fda9af21d041888f9315db2e0f6ff7167ec60af0a19f8eeb5e4d6b92c2a78f32e07602dca3e1223c77dfca5e2c2f4a54a3fc553400d7fdebb96f6022ecd3aff078a5fc3ff24303ab8ce0d746d1fd768ee72e3e3d59dad688ca63734f46484b45a740e40a25551feb058410e8e41e3c7d9a074d19b8d76bb7478b2c3c13ddafb7e6bd5b79d4a489d0a2aa79ab848beb706ef02a644fc9854dacea4a9da85f838464fb5272914cc783d7ae0aec0cfdc419164945924bd10863d733aad780013b37681cc4aa4c5680cc76efdd1f97e0163a5831101a890701d5eceed73596e74a274a3c392b6b150d27d3a9a9d21f28ea66a47541c4f1b0cbbe25231d71e722540286d09544deeea4ff9fc07776150eefb9fe6213cc2f226af3ba76848e87a0ccf1fba54fb220d1909647e69e831440815f084774f84ecb1d73244e30ae6762f9b67beb38c302484985aac1bb9d4979609bef2680c9dcecfd5f85a42ff1bb12c5be84227c2f310b0f78fdca781a0b9607cf740ed04009032cb245047b192523f87419b477a299c34873b4171dc60cc3e9e683f08d6a3e13b265b7ff22f2c527a1777e82e0aa897a2d637ab5f64791de1a37302ea1f49a2da4154e901c5cae9e32a85de783a2acd2a5efb1b557697ef270fb8b06e92dac56ca556f19e84527f540950f23b16987c51fa0bc7ffccccf31188ab23588c7065bdc4e536226f0a71ea6629c083c6973dfab240df0e5c68a962157b8bd292216713511fad3bf41b6a09b128222e2e1529cf6c88dc3b10579d54b191c0de353c68e69a6e4621e77a7715c9f1764a6f119b9afb8e530ae1103648671dc87fa9b416c0576e05ec643e7f9416e459e48511b657c806560c23f61a23944749f232dcecfe66dc6596d3ac18ad8e84586eb74313b4f94921f5297486f88ac707ee8888a97af01d3244a0aa9acc4528c70307fbd31bf4f568f45f4f04ba69895acc03a855ff2f7c6ee053c8fdd13b1881438c759ba18a9996f79007adb0bccaf9b014c8a1899ed6aede16b371eba67a8e670cdd226376cffe8b56cc11375bf952997f1231d02bc9b070d951c42c58d8614a81a03dddfb3fc6e5e23ee6b27ccbbe19a883a7c338267b8c865c7c5cd99648d676578a73dabf1d7e34721dcdae353a23d7be86472e3a7550957fcc3fc954545394e68c3a63d409e442d9081e7f104593998a1d577d4dc02a2854357671d5271ccc989f66ba54767c4eb52c7a34fd0695a7783766936f6e9ef59d02ea424e9b441540f5f663e5464ec718b42e9d13fca7f2a4f4eae63d2c2bdca0a32260487a931fac0c41d59d39eb183740a48b3891d3a0d6caa8144e37680f107c5fa3acb11dbf13594d8f0b24f0800d297ac97c0586441da767c5dbe0488ae24735f2571274d9b1fd29c4e0488a3fe3f21053e582640bed1949bef6c12eb8a94728ae44275d4117b50807d72814e9f733689f5bc28094237b7e32e5418bafcc2211375a44f94476ae05bf537bf12475848b158905dbb03cc42fcacb5ea1d1b3c7261ea07051bc53108152f53a421c899154ebecade0c3faa451209af678eeb4c46f473f930c2ad685d0985c5b1c93d1b74af2fca7ba3e34abf185678f6b98b8bedea3562b34abd147a3ee70ab7ff593f2b37b032cd0817e269064aa062dc83f2d7d1f145d6bb98d3eef793a470e3b12e90b4028c82447366c64b0da899d2997cc5688e41d17e4572d92af6b5b5a5e2a3410a7ec9ee3faac12bf29f5a2f89c99bab8ff22eabdc957d1a0b0e7d10abd11dbd1fcf9469afc822ced47f724e934d9b038391be98a60de090d3e27ea217dbc63b1b208102b069617e48576b77cdde7c86f80219f4ff52fc40618c9dcd1935d7cdfdb310a59c1e6ff4ddc6d3292a595612a06a3f112b8d39f3affc957b56ee3ea23207039f063ed233b4a03651393e0b5e92d4c372e8101d7a090e67fd9b7d466403a06593c90d29abdf613e9e2780f2e91e13ad31d11c8a885b1a2e6c4ddb5866d13de7a02f3311875de64c040ffc2d2bb08d057c1b70eb88a646d8e4907d15dad8d65a7f7f6d7e5bc3d39646f6271895ae1674495bce79c27b82657d852561201538e79c48f1bbdc1021d0951f86014775e4331b423efa275a46f43691051c857cbfbcadc61be41b8dedc12aeab61333b1a778c654608c4018a80e23d21757d3b70caee8a602a871e5c768ffa32fa1c065d6326d03f5fe3a6f0a9663889066292eb86a8e36c9d968ae2f91267b4da926f37eea5e40abe0fc42d25f8717697a5b5108908fc00d11c5e30c1f70f5eb60c996748ce7b0819f62b1273174f0ac7485445efcccc52fc7f0a85d1722fa5dae69e9a7fff9eb23ed8591171040d57fd9a431ae7158359d5f772510f44b877a5dca40e842f365604b26b6a18a6dcc99017bea8b5b01bbb5c5fd9245be67cfdcb40a5ed2171d2ce7ca77e199955f8411abc7b57882182c967d8218f4891f0901134b5587fc32596d6bfac32ad9dffe4ea14907a8b14b2324a7f061fab9d0ca93dcee86b2866836aa0aebbf225eb4ec1956d7363e29bd49bb36c74dc141e0cd4eecc061f8de1d3e18ebc3689b7d1ee24660ac3f2fc47207c511f0d9b92a203d143bf61b5d543713b3d3e4772b403cf788fac8e687d88a26736ac56bb520e2d4b26cfded0f91368db09de5b851ae275ccc167bea27773d4111ffd7ba1caf0f536d336c976e53ec2fc170397d362a3058c22b9c1d0a5d8c184b28bb5c74404aaa3b928a1e70cf9ce56f910f63ba8c5b29b62c8fc1548759224793ffd6ed02c3abd7e7a440ae0e4321c92fcf0c0a4359d51640c7bac465d02a4683a9d91037bce076fac9db62aa6334a72ed89c4750c6fa5167f4893d281b756ae4c9d11f2ed9cc1b7a61c60d14ccbc1ebd4e474aef5a4dd07eb5c4d13205d5a505debf457954ebf4aef4edba87758bb37da259b33ec7063e6ef2094995171ef9f50bf549309c94f38de690624b16b101ec7c47cdffcb254999b8a5c7fb2a52f7cf61c248462af31accac605f5e3ceaa2b3837d79e8f30a3c9613fa9bf83749362283bd21415146fe8c8c522c847b234f5c6ee2508027afc9866224f1ec8aa6093a2e590e6c957e01f91f0b0758ae2809476b9dabfb67a41496e382af009f99f735741b733b82368a7fb3045e3c37dab1aa55270861f370206d3c033d7ac362f9b9d81c233d3db783703a7faabe510407dc24b0f9610d3cca2b3c684ccad000942e43e99082d841582bb8dccc209d7bb091ab6b5b7cfb72dd8754ed211ed072720c4f8405a2bf2701eadd87ebfe5eed902ce76854a50d6687bc647d6fd2a40bf9459696e2d247d82989b489f57bee748ae4c826cf292edb463c858f41ad7e3b59024e67019eba6f0238107b3c2021d46de38e9410fd323449e202da8a1c97f8217a0144cf5ab641e6fcf80cd8b9365024f99b2f2a303397b7aacbac269e9c40453026181c70cd4bdbbf91bf8939003e89eda149a94b641e68caefa6e3818f2192ceb320ce9ed01a011283f323d59e4037ecedd5c9aa884e5d0669ea8b9b7d59da995471d617b550a38cf4aa5729aa84e323370e3653860fd31f9d34dd26d6ac2cb328a8f1340b48cf4439bd37d9a04f9193920e75ebac9e7dd7fd0d542552d51fa068887e1f28d35a71d7f2eb643099a2410859d75f87d577c99591fdcc18a5713a05f790119584614197c717d3075b2ad1d1ddf7b9dc99401e02f1b210e1496944c5d755a8f54a55a80292a40e698ce8975999465bec9addb80cf1ad3205d6da3c92d40d75d926e34ecfbd51ff985b75c3d3c4739650e4b0e90641a1ffc8204530fee45fc6c527259e4b2df73d4f9e2cb187f417d7a616e5945569aaa39c080debaff99fc44e7edb152b4ef5107c21e5164c2d19c1a90cb0250d1ffb5b1ec472bb9a1f171af176dad958866f06cecca6397bb501fdb78ee715b1f686d1dfa3cf118c457acbd19808f22aa49d7b5edfe39850d4a458d81fdfb2c6e8bdc763a77515bf1549f812371e30ec4b399bf0147f74d770fa618f49309675156dbed72a537a5d3b8715070b55a23940504ec01081a5fb0f68ad4e5fafadb9d481f7d39b897ecb7260dffb24c4f8eadf124f9c91db04b02154411bc2d1aa9523a17480eb89382b5f3bf582ee75ab4fe8e00c1f95f3b1a4f7791aec60e347bc3f80060b91910c6ac696cb6e8a6e75630bbd807443150d57be0d7e921b53bb2d8cdb656898a07b288992c236b84f060f9199dc77f9eb9c8fc0e6c2089860edffa55b9d1"}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r4, 0x0, 0x10000000000443) 17:02:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x20000000, 0x0, 0x0, 0x0) 17:02:32 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000200)={0x87e, 0x400, 0x34e, 0x3, 0x5}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sm3\x00'}, 0x1) socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="3b5f9055f12c135f4e83f15d1276478a528fb305da48552512a38b0b6fb8dae633f626cc01993595367ba246f4ec81c53dd597c2ec5d73f345f3f39a989d844a8cbbd836294d28f206f897ef73517673d340a2fe2916c3c27ca5f3550a5e42f47380a07311ae1f27cebbe43bcdc25b3acc6f9864f4d6c9ec5fcf8055a10fe9110ed64ff76d2b247fc6c73a33450f20b2b4093ecf4905577331fc4a7acc3ecf4b9f9b", 0xa2) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x700, 0x0, 0x0, 0x0) 17:02:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x72, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:32 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f3}, 0x28) [ 2259.510446][T22649] mkiss: ax0: crc mode is auto. 17:02:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x74, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$setown(r1, 0x8, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) sendfile(r1, r4, 0x0, 0x10000000000443) 17:02:33 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f4}, 0x28) 17:02:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x3f000000, 0x0, 0x0, 0x0) 17:02:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x900, 0x0, 0x0, 0x0) 17:02:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x8, {0x8, 0x1, 0x4, 0x200, 0xff, 0xffffffffffffffe0}, 0xbcd, 0x8}, 0xe) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x7a, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:33 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f5}, 0x28) [ 2259.962932][T23155] mkiss: ax0: crc mode is auto. 17:02:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4cf0f1d77ce91ee9, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r4, r5/1000+30000}}) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r6, 0x0, 0x10000000000443) 17:02:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x86, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x40000000, 0x0, 0x0, 0x0) 17:02:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x8000000000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x80000001, &(0x7f0000000040)=0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x8, 0x3, 0x34d23147, 0x200}, {0x2, 0x0, 0x3ff, 0x88}, {0x2, 0x7, 0x4, 0x80000000}, {0x9, 0x7, 0x168, 0x63}, {0x20, 0x3, 0x2, 0x3}, {0x3, 0x8, 0x6, 0x1}, {0xffff, 0x7, 0x800, 0x100}, {0x0, 0x7fff, 0x4, 0x9af}, {0x3, 0x10001, 0xffff, 0x93}]}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000140)={&(0x7f0000ffe000/0x2000)=nil, 0x6, 0x4, 0x10, &(0x7f0000ffe000/0x2000)=nil, 0x4}) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:33 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f6}, 0x28) 17:02:33 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f7}, 0x28) 17:02:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xa00, 0x0, 0x0, 0x0) 17:02:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = accept(r0, &(0x7f0000000000)=@x25, &(0x7f0000000080)=0x80) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000bc0)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e20, 0x9, @local, 0x8}, {0xa, 0x4e23, 0x6, @mcast1, 0x80000000}, 0x3, [0x1, 0xb9, 0xcb, 0x6, 0x8000, 0x0, 0x3ff, 0x4]}, 0x5c) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$KVM_SMI(r6, 0xaeb7) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @multicast2}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000440)=0xe8) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000380)='team_slave_1\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000940)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20420d00}, 0xc, &(0x7f0000000900)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="c000000000000000", @ANYRES16=r2, @ANYBLOB="04002bbd7000fcdbdf250300000008000100", @ANYRES32=r4, @ANYBLOB="a401020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ffffff7f08000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000900000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c0004000800000000000000ff7f0201050000000300ff0004000000ff0f073f010000003300f72e07000000"], 0x1c0}, 0x1, 0x0, 0x0, 0x4}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f00000000c0)={0x6, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e20, @multicast2}}}, 0x108) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x10000000000443) [ 2260.378728][T23656] XFS (loop1): Invalid superblock magic number 17:02:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) lseek(r1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:33 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f8}, 0x28) 17:02:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x40000001, 0x0, 0x0, 0x0) [ 2260.473004][T23891] mkiss: ax0: crc mode is auto. 17:02:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x0, 0x8, 0x80, 0x5, 0xa06b, 0x200}) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15f9}, 0x28) 17:02:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x8c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xb00, 0x0, 0x0, 0x0) 17:02:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x22800, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000040)={0x1, 0x4}) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r4, 0x0, 0x10000000000443) 17:02:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15fa}, 0x28) 17:02:34 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x300, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x2a, 0x29, 0x2, {0x200, [{{0x88, 0x1, 0x3}, 0x0, 0x1, 0x7, './file0'}]}}, 0x2a) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x50000000, 0x0, 0x0, 0x0) [ 2261.031251][T24420] mkiss: ax0: crc mode is auto. 17:02:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15fb}, 0x28) 17:02:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/178, 0xb2) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="64f5d9f7", 0x4) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040)=0x1, 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) [ 2261.135096][T24425] XFS (loop1): Invalid superblock magic number 17:02:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x80000007, 0x0, 0x0, 0x0) 17:02:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) getsockname$ax25(r0, &(0x7f0000000000)={{0x3, @null}, [@rose, @null, @default, @null, @rose, @null, @default, @default]}, &(0x7f0000000080)=0x48) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'trusted.', 'net/route\x00'}, &(0x7f0000000140)='cbc(blowfish)\x00', 0xe, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x400000, 0x20) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r3, 0x0, 0x10000000000443) 17:02:34 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15fc}, 0x28) 17:02:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r3, 0x326, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x5f8de9b5f36656d2}, 0x40000) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xa8, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xd00, 0x0, 0x0, 0x0) 17:02:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15fd}, 0x28) 17:02:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x80000008, 0x0, 0x0, 0x0) 17:02:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r0, r1, 0x0, 0x100000000102) 17:02:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x5, 0x1, 0x2, "9df4dc55f8e379e2ea24e8207ead3d2e11c81230e3f73a145dd108a573e720283a1492148960e7a7ea5739c042988f8ab303eb958882bb7ae0ebbf2dbd9dff", 0xe}, 0x60) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x9, {0x7, 0x5, 0x7ff, 0x9, 0xfffffffffffffff7, 0x9}, 0x3, 0xfff}, 0xe) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) [ 2261.743089][T25263] mkiss: ax0: crc mode is auto. 17:02:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15fe}, 0x28) 17:02:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xc4, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$sock_netdev_private(r1, 0x89ff, &(0x7f0000000000)="6cb0911e2476e4eeb7c4fa0bbe632eab53ee54b227b8829b773408964b940a4e2380c38fe72c59a925889ef561c107b995b493") ioctl$BLKBSZSET(r3, 0x40081271, &(0x7f0000000040)=0x9) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x15ff}, 0x28) 17:02:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x80000019, 0x0, 0x0, 0x0) 17:02:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1400, 0x0, 0x0, 0x0) 17:02:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x140, 0x4) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000180)={@loopback, @local}, 0x8) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xb) r5 = socket$kcm(0x29, 0x5, 0x0) close(r5) r6 = socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x8, 0x1, 0x1, 0x8, r7}, 0x10) sendmsg(r6, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local, 0xd}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)='\x00', 0x1}], 0x1}, 0x45) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0xfffffffffffffe18}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f0, &(0x7f0000000580)='ip_vti0\x00') r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f0000000100)=0x11) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f3, &(0x7f0000000580)='ip_vti0\x00') setsockopt$sock_attach_bpf(r5, 0x1, 0xd, &(0x7f0000000080), 0x2a1) close(r5) sendfile(r2, r3, 0x0, 0x10000000000443) [ 2262.112857][T25680] XFS (loop1): Invalid superblock magic number 17:02:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1600}, 0x28) [ 2262.209330][T25821] mkiss: ax0: crc mode is auto. 17:02:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1601}, 0x28) 17:02:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0xfffffffffffffc8a) r1 = accept4(r0, 0x0, 0x0, 0x40000000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x86, 0x100) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x8000001a, 0x0, 0x0, 0x0) 17:02:35 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1602}, 0x28) [ 2262.503411][T25908] syz-executor.2 (25908) used greatest stack depth: 21048 bytes left 17:02:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xec, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x2000, 0x0, 0x0, 0x0) 17:02:36 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040)=0x20, 0x148) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) [ 2262.632873][T26305] mkiss: ax0: crc mode is auto. 17:02:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept$ax25(0xffffffffffffffff, &(0x7f0000000140)={{}, [@null, @remote, @rose, @default, @null, @remote, @remote, @netrom]}, &(0x7f00000000c0)=0x48) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000001c0)=0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r4, 0x0, 0x10000000000443) write$capi20_data(r4, &(0x7f0000000000)={{0x10, 0x3, 0xff, 0x81, 0x81, 0xd3}, 0x81, "68543bd812eb7a5753e53f257c804b61996458064c0cd7e0f7666e0997fef71f4b550e406c0cf378817d73d374202ac9a3d95fe13733959fc160d5c362cafda0363e7c2b457620cdd75b74c85c864f238466e0dd2f35b72064260435890e494ebbdc234fe996592e87f664ca612f90a343fe921c1644f3d0d2b4df7f43f5315edf"}, 0x93) 17:02:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1603}, 0x28) 17:02:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x8000001d, 0x0, 0x0, 0x0) 17:02:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xf4, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1604}, 0x28) 17:02:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="3e5ac9868e420a8c2116e4112dc9e080d10f10f307def66b3c5523662b1eb86ea011d7e15863afa87c400984c0fe293a6e2a7db96c6864d91aedbe68468d40accb1ae48bf0e44351c9998ba95e38abe7b3408ac1e736454135da0da05abe58310c812a12da039f11429f24352885814227d86554d4", 0x75) 17:02:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x4000, 0x0, 0x0, 0x0) 17:02:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xfc, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1605}, 0x28) 17:02:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xc0000000, 0x0, 0x0, 0x0) 17:02:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="694c4c4764d23e34cf3f298caf4713cc3e90bffb", 0x14}, {&(0x7f0000000040)="b523910b5fe4edf3e90c88723c5a17a2341983457b9159ac513eaee24e1959b8a6c8dd5defea1d77c4ab1a81f296f0548cf219a9e23eb01249da216fdecbd6ecd21f9400ffeea864e23625fcfb0cf904901351ed8fb12f58d378b6d754b14ac8178ea81e2913807f33fcf898a5cc3611100827d75fb5b24c5f533fcdf760523cc095caceb5a8c1f9ad87988cb25e7315c5", 0x91}, {&(0x7f0000000140)="98e355d0a5f272fbc9fe660271999c39d0d9e7de90dad29883d96bcad06e61c7c67f5c3f35b1890cdd5dcb6da4455bdb35fe007398a5a6f198dbab0b9df02c656765c6f96f31358e5b39c3801d051324d28767ee51a65d1a6d2f9b44e1b6854b80cb74bc5b0acb0e5301f987d23b15c607b7aa4b6247cdc31a6ccd78f04fa4c4", 0x80}], 0x3, 0x17) [ 2263.092081][T26851] mkiss: ax0: crc mode is auto. 17:02:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x120, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x200000) r2 = fcntl$dupfd(r1, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r3}}, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r4, 0x0, 0x10000000000443) 17:02:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1606}, 0x28) 17:02:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x126, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1607}, 0x28) 17:02:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r1, 0x0, 0x10000000000443) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000080)={0x56, 0x5, 0xccf7, {0x8, 0x7fffffff}, {0xf74b, 0x1}, @period={0x5f, 0x8000, 0x7ff, 0x8, 0x7, {0x1000, 0x9, 0x28485f97, 0x101}, 0x7, &(0x7f0000000040)=[0xffffffff, 0x1, 0x400, 0x1f, 0x6, 0x1f, 0x1]}}) 17:02:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x5000, 0x0, 0x0, 0x0) 17:02:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x3ff, 0x0, 0x10003, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000080)={r3, 0x2}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r4, 0x0, 0x10000000000443) 17:02:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x148, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xc0000001, 0x0, 0x0, 0x0) [ 2263.540822][T27384] mkiss: ax0: crc mode is auto. 17:02:36 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1608}, 0x28) 17:02:37 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x80000001, 0x80000) sync_file_range(r0, 0x802, 0x87, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80000, 0x0) sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = open(&(0x7f0000000000)='./file0\x00', 0x503002, 0x40) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000040)={0x11, 0x2, 0xaec}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r4, 0x0, 0x10000000000443) 17:02:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1609}, 0x28) [ 2263.777172][T27428] XFS (loop1): Invalid superblock magic number 17:02:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ff, 0x0, 0x0, 0x0) 17:02:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xebffffff, 0x0, 0x0, 0x0) 17:02:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x160a}, 0x28) 17:02:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x9, 0x0) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) [ 2264.053530][T27917] mkiss: ax0: crc mode is auto. 17:02:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x160b}, 0x28) 17:02:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x180, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) 17:02:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @empty, 0x0}, &(0x7f0000000140)=0xc) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @random="d73ec01c14f9"}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r2, 0x0, 0x9f4a) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x9, 0x400000) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000340)={'nat\x00'}, &(0x7f00000003c0)=0x78) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1100b}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r5, 0xc}}, 0x10) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000040)={0x1d}) 17:02:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x160c}, 0x28) 17:02:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x402000, 0x0) connect$rds(r1, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="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", 0xfffffff6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r4, 0x0, 0x10000000000443) 17:02:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x7400, 0x0, 0x0, 0x0) [ 2264.486701][T28358] XFS (loop1): Invalid superblock magic number 17:02:37 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x160d}, 0x28) [ 2264.542960][T28459] mkiss: ax0: crc mode is auto. 17:02:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000), 0xfffffffffffffe1f) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x101040) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000080)={0x81, 0x3, 0x3ff, 0x0, 0x2e, 0x80}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000240)='net/route\x00') sendfile(r1, r4, 0x0, 0x10000000000443) 17:02:38 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xfffffffffffffffd, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x80000000}, 0x4) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000000)={0x3, "b5007b5a60fbc526c52154d65d7a324c00", 0x2}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) lseek(r1, 0x0, 0x3) r2 = accept4(r1, 0x0, 0x0, 0x10000000000801) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc9f123c123f3186b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f00000000c0)=0x99) sendfile(r2, r4, 0x0, 0x10000000000443) 17:02:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x160e}, 0x28) 17:02:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 17:02:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x9400, 0x0, 0x0, 0x0) [ 2264.948039][T28964] mkiss: ax0: crc mode is auto. 17:02:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1a6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x160f}, 0x28) 17:02:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r1, 0x0, 0x10000000000443) 17:02:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xff600000, 0x0, 0x0, 0x0) 17:02:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mq_notify(r1, &(0x7f0000000080)={0x0, 0x3b, 0x1, @thr={&(0x7f0000000040)="e8f75c691598b57832c3db2fd0fc61ebf49e59b5704c783d4384af", &(0x7f0000000140)="61bcf0fc38476cd309230f6a6fbf7accd10d536f8a1d96b80aa827c6094bdaf7e13fedb1193469bae217fab4a15a20fd5246a8698cc87c4d4662c3f8061ff8e46e9d01a6a121f933839b4ef95a8f444316258b4d5998d4f2e7decc2de6cf9a0a725b5e1c3d18626bd72128c83030b97479a0d9f56ddd961830318b89d3960f77faa6a1927d8f58b5915722d2cf5aac82df453ceccccc51ce60b98b51f4bffd91c5298906f0194c1b46f6795bd54493467267e4af33d7d11685d62e92e03d542f9815e559e47ec9ff6bd927d9cbc7169191032287620427bc46b9aaa83a8fdaadfb84f4b78fa9d67b0c48a181ce2a6c60a82e679161aa3658"}}) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r4, 0x0, 0x10000000000443) 17:02:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1610}, 0x28) 17:02:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xe0ff, 0x0, 0x0, 0x0) 17:02:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1a8, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0x1, 0x1, 0x3, 0x3f04, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000100)={r4, 0x0, 0x100, 0x1, 0x0, 0x10000}, &(0x7f0000000140)=0x14) 17:02:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1611}, 0x28) [ 2265.352663][T29412] mkiss: ax0: crc mode is auto. 17:02:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1c0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x24}) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) 17:02:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xffff8000, 0x0, 0x0, 0x0) 17:02:38 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1612}, 0x28) [ 2265.597643][T29682] XFS (loop1): Invalid superblock magic number 17:02:39 executing program 2: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) r1 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b40)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="eaca5b63a76e1759e557c67934c01c7b6237ff16b374addc76d47163fbf25471be215e24ed75a522896a9daf7ac5905767f99345d24b40f294548c7889768ae29b5b3568ed787f6bbcb369226e4693f4dfaef2006b5d3db4c235babaa85e13d31725a180c2ad9e109b31ccdd84229d97b9aaffb2e169a260fbd95242055c7c2e07d370692b5628a559ceb66c1e4a8ee55edc53e46f794c09bf70e843d9bbd8b887824f868adb3acd37adcf39799ef935a082a29e86ca4c8fe5490b599ce5c73851f3febe613f06586a5c7c6f346b159cfa408486821885b62d1222328f500af76c609d38c9", 0xe5, 0xb5}], 0x2000, &(0x7f0000000c40)={[], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_type={'obj_type', 0x3d, '}'}}, {@euid_lt={'euid<', r1}}, {@fsname={'fsname', 0x3d, 'cbc(blowfish)\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'srh\x00'}}, {@seclabel='seclabel'}, {@uid_gt={'uid>', r2}}]}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)="9716e7f8", 0xfffffffffffffec1) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) setxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:fonts_t:s0\x00', 0x1d, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x68e3) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000d80)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000858eeeaf322b95ed3000000000000000e000000040000007805000000000000b8030000b8030000b8030000b8030000a8040000a8040000a8040000a8040000a804000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002380200000000000000000000000000000000000000000000000038017274000000000000000000000000000000000000000000000000000000000100000000020000010000800800000004040000fe80000000000000000000000000001afe880000000000000000000000000101fe880000000000000000000000000101fe8800000000000000000000000001010000000000000000000000000000000000000000000000000000000000000001ff020000000000000000000000000001fe8000000000000000000000000000bb00000000000000000000000000000001391de938da82a687aff4f1b7c875f891fe8000000000000000000000000000bb00000000000000000000ffff0000000000000000000000000000ffffac1414bb00000000000000000000000000000000fa3bd9724f44f04cc99bc9ceb9f47ad2000000000000000000000000000000010a00000038005345540000000000000000000000000000000000000000000000000000037ca00608000103000800f002000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005801800100000000000000000000000000000000000000000000000090007372680000000000000000000000000000000000000000000000000000016c00020204000000ff020000000000000000000000000001fe800000000000000000000000000017ff020000000000000000000000000001ffffffffffffffff00000000ffffffff00000000ffffffffffffffffffffffffffffff000000000000000000ffffff00400810000000000028005443504d53530000000000000000000000000000000000000000000000005cbe00000000000000000000000000000000000000000001ff020000000000000000000000000001ffffffffffffff002a6feab2ffffffffffffffffffffff00ff000000ff000000767863616e310000000000000000000063616966300000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003a00050011000000000000000000000000000000c800f000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x5d8) r6 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/dev\x00') sendfile(r4, r6, 0x0, 0x10000000000443) 17:02:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xffe0, 0x0, 0x0, 0x0) 17:02:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1613}, 0x28) 17:02:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) [ 2265.867407][T30068] mkiss: ax0: crc mode is auto. 17:02:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) fcntl$getflags(r0, 0x409) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9c, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r5, 0x0, 0x10000000000443) 17:02:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0xfffffffffffffffe) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000000)) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1614}, 0x28) 17:02:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1e8, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1615}, 0x28) 17:02:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x200000, 0x0, 0x0, 0x0) 17:02:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = gettid() r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ptrace$getregs(0xe, r1, 0x0, &(0x7f0000000100)=""/132) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000000000)={0x0, 0x0, @ioapic}) 17:02:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 17:02:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1ee, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1616}, 0x28) [ 2266.347590][T30547] mkiss: ax0: crc mode is auto. 17:02:39 executing program 5: r0 = add_key$user(&(0x7f0000002540)='user\x00', &(0x7f0000002580)={'syz', 0x0}, &(0x7f00000025c0)="bbd90e126e7b5b08daa98ca9ded0067668d68d6617a6bf634ec27452fef70608b8111d3657c4d871c304ef3136f11d72ee1aa6f8a9c85d94b84df6fc4a77b90ed946aafd3b4c875f4cb3", 0x4a, 0xfffffffffffffff9) pipe2$9p(&(0x7f00000026c0)={0xffffffffffffffff}, 0x84800) close(r1) r2 = add_key$keyring(&(0x7f0000002640)='keyring\x00', &(0x7f0000002680)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, r0, r2) mq_unlink(&(0x7f0000000340)='cbc(blowfish)\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x101000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f00000003c0)={0x0, 0x0, [], @raw_data=[0x3, 0x401, 0x8, 0xd71, 0x1, 0x7, 0x10000, 0xff, 0x1d9, 0x9, 0x4, 0x8, 0x0, 0x9, 0x9488, 0xfff, 0x7, 0x0, 0x1ff, 0xffffffff, 0x5, 0x0, 0x10001, 0x100, 0x1, 0x5, 0x6f5, 0x0, 0xf5, 0x1, 0x3, 0x2]}) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r4, r7, 0x0, 0x10000000000443) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r7, 0x84, 0x21, &(0x7f0000000200), &(0x7f0000000300)=0x4) readv(r7, &(0x7f0000000280)=[{&(0x7f0000000000)=""/153, 0x99}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000000140)=""/184, 0xb8}], 0x5) 17:02:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1617}, 0x28) 17:02:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x20a, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x10000000000443) 17:02:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xffffffeb, 0x0, 0x0, 0x0) 17:02:39 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1618}, 0x28) 17:02:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x307100, 0x0, 0x0, 0x0) 17:02:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @remote}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @rand_addr=0x50ac9fff}, 0x20, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='nr0\x00', 0x1ff, 0x400, 0x6}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') epoll_wait(r2, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x2) sendfile(r1, r2, 0x0, 0x10000000000443) [ 2266.674927][T30809] XFS (loop1): Invalid superblock magic number 17:02:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000000)={{0x1, 0x2}, 0x20}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') accept$alg(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000000000443) 17:02:40 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1619}, 0x28) [ 2266.800623][T31106] mkiss: ax0: crc mode is auto. 17:02:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x4000000000, 0x0, 0x0, 0x0) 17:02:40 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x161a}, 0x28) 17:02:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(gcm-aes-ce)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_smc(0x2b, 0x1, 0x0) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$SIOCRSACCEPT(r1, 0x89e3) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x21c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x400000, 0x0, 0x0, 0x0) 17:02:40 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x161b}, 0x28) [ 2267.205990][T31522] mkiss: ax0: crc mode is auto. 17:02:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x8000000000, 0x0, 0x0, 0x0) 17:02:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/104, 0x68}], 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x0, [@null, @default, @default, @bcast, @default, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = accept4(r1, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0xb6f, 0x101100) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r4, 0x0, 0x10000000000443) [ 2267.347901][T31580] XFS (loop1): Invalid superblock magic number [ 2267.368619][T31580] BUG: MAX_STACK_TRACE_ENTRIES too low! [ 2267.371761][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2267.374209][T31580] turning off the locking correctness validator. [ 2267.374232][T31580] CPU: 0 PID: 31580 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #37 [ 2267.374243][T31580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2267.374247][T31580] Call Trace: [ 2267.374278][T31580] dump_stack+0x172/0x1f0 [ 2267.374302][T31580] save_trace.cold+0x14/0x19 [ 2267.374321][T31580] check_prev_add.constprop.0+0x8dc/0x23c0 [ 2267.374336][T31580] ? __save_stack_trace+0x99/0x100 [ 2267.374358][T31580] ? check_usage+0x570/0x570 [ 2267.390464][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2267.395864][T31580] ? kasan_check_write+0x14/0x20 [ 2267.395878][T31580] ? graph_lock+0x7b/0x200 [ 2267.395889][T31580] ? __lockdep_reset_lock+0x450/0x450 [ 2267.395906][T31580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2267.395928][T31580] __lock_acquire+0x239c/0x3fb0 [ 2267.429708][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2267.433963][T31580] ? mark_held_locks+0xf0/0xf0 [ 2267.433980][T31580] ? finish_task_switch+0x146/0x780 [ 2267.433998][T31580] lock_acquire+0x16f/0x3f0 [ 2267.434024][T31580] ? flush_workqueue+0xf7/0x14c0 [ 2267.449855][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2267.450005][T31580] flush_workqueue+0x126/0x14c0 [ 2267.459897][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2267.466163][T31580] ? flush_workqueue+0xf7/0x14c0 [ 2267.466182][T31580] ? lock_downgrade+0x880/0x880 [ 2267.466197][T31580] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 2267.466217][T31580] ? free_percpu+0x25a/0x740 [ 2267.466242][T31580] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2267.471434][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2267.478403][T31580] drain_workqueue+0x1b4/0x470 [ 2267.478418][T31580] ? drain_workqueue+0x1b4/0x470 [ 2267.478433][T31580] destroy_workqueue+0x21/0x700 [ 2267.478448][T31580] ? percpu_counter_destroy.part.0+0x17e/0x230 [ 2267.478469][T31580] ? free_percpu+0x25f/0x740 [ 2267.478568][T31580] xfs_destroy_mount_workqueues+0x3b/0x1c0 [ 2267.588952][T31580] xfs_fs_fill_super+0x8e9/0x1670 [ 2267.593993][T31580] mount_bdev+0x307/0x3c0 [ 2267.598344][T31580] ? xfs_test_remount_options+0x90/0x90 [ 2267.603926][T31580] xfs_fs_mount+0x35/0x40 [ 2267.608273][T31580] ? xfs_finish_flags+0x490/0x490 [ 2267.613306][T31580] legacy_get_tree+0xf2/0x200 [ 2267.617998][T31580] vfs_get_tree+0x123/0x450 [ 2267.622721][T31580] do_mount+0x1436/0x2c40 [ 2267.627454][T31580] ? copy_mount_string+0x40/0x40 [ 2267.632421][T31580] ? _copy_from_user+0xdd/0x150 [ 2267.637895][T31580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2267.644142][T31580] ? copy_mount_options+0x280/0x3a0 [ 2267.649560][T31580] ksys_mount+0xdb/0x150 [ 2267.653832][T31580] __x64_sys_mount+0xbe/0x150 [ 2267.659156][T31580] do_syscall_64+0x103/0x610 [ 2267.664497][T31580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2267.670594][T31580] RIP: 0033:0x45ac7a [ 2267.674503][T31580] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 17:02:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x10000000, 0x6, 0x9c, 0x1ff, 0x3ff, 0x7, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x3, @empty, 0x3}}, 0x5, 0x58fb0f4e, 0x8, 0x9, 0x5}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000280)={r4, @in={{0x2, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r3, 0x7}, &(0x7f0000000200)=0x8) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r5, 0x0, 0x10000000000443) 17:02:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x161c}, 0x28) [ 2267.694428][T31580] RSP: 002b:00007fd9a6a3ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2267.703123][T31580] RAX: ffffffffffffffda RBX: 00007fd9a6a3bb40 RCX: 000000000045ac7a [ 2267.711134][T31580] RDX: 00007fd9a6a3bae0 RSI: 0000000020000240 RDI: 00007fd9a6a3bb00 [ 2267.719118][T31580] RBP: 0000000000000000 R08: 00007fd9a6a3bb40 R09: 00007fd9a6a3bae0 [ 2267.727130][T31580] R10: 000000000000021c R11: 0000000000000206 R12: 0000000000000004 [ 2267.735111][T31580] R13: 00000000004c6b80 R14: 00000000004dc190 R15: 00000000ffffffff [ 2267.782627][T31875] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2267.797603][T31875] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2267.818994][T31634] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env 17:02:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)={r0}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000007c0)=0x18, 0x4) syz_open_dev$ndb(&(0x7f0000000800)='/dev/nbd#\x00', 0x0, 0x40040) recvmsg(r0, &(0x7f0000000740)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000140)=""/171, 0xab}, {&(0x7f0000000280)=""/129, 0x81}, {&(0x7f0000000340)=""/78, 0x4e}, {&(0x7f00000003c0)=""/76, 0x4c}, {&(0x7f0000000200)=""/58, 0x3a}, {&(0x7f0000000440)=""/56, 0x38}, {&(0x7f0000000540)=""/130, 0x82}, {&(0x7f0000000600)=""/17, 0x11}], 0x9, &(0x7f0000000700)=""/34, 0x22}, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x20001) ioctl$VT_WAITACTIVE(r2, 0x5607) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r3, r4, 0x0, 0x10000000000443) 17:02:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x161d}, 0x28) [ 2267.858949][T31634] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2267.877982][T31634] kobject: 'rx-0' (00000000e00fc8d7): kobject_cleanup, parent 0000000031f995f0 [ 2267.883363][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2267.889492][T31875] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2267.903668][T31875] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2267.912809][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2267.920518][T31634] kobject: 'rx-0' (00000000e00fc8d7): auto cleanup 'remove' event [ 2267.946872][T31634] kobject: 'rx-0' (00000000e00fc8d7): kobject_uevent_env 17:02:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x3, 0x1) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'ip6erspan0\x00', 0x20}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x63, 0x1, 0x0, "14f5957ca9e6e05facfb5d6b33a8805a", "bef505aa484eefbf5f0eda348f15072dc1895e43537243ebcb3e6416fdad13ddc7d251319138bee2545f6abe900d4aeea51159d6266c6cc3251ef455382e1c9d943d9ede7d3a29b1841f9becf492"}, 0x63, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000280)={'filter\x00', 0x0, 0x3, 0xb4, [], 0x0, &(0x7f00000000c0), &(0x7f0000000140)=""/180}, &(0x7f0000000200)=0x78) sendfile(r1, r4, 0x0, 0x10000000000443) [ 2267.951409][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2267.963966][T31634] kobject: 'rx-0' (00000000e00fc8d7): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2267.968480][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2268.000168][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env 17:02:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x161e}, 0x28) [ 2268.008658][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2268.020202][T31634] kobject: 'rx-0' (00000000e00fc8d7): auto cleanup kobject_del [ 2268.028986][T31634] kobject: 'rx-0' (00000000e00fc8d7): calling ktype release [ 2268.038441][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2268.046605][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2268.056575][T31827] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2268.060850][T31634] kobject: 'rx-0': free name [ 2268.070522][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2268.078902][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2268.089954][T31827] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2268.100376][T31634] kobject: 'tx-0' (00000000e924aab1): kobject_cleanup, parent 0000000031f995f0 17:02:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) [ 2268.111124][T31580] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2268.124246][T31827] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2268.128336][T31580] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2268.132377][T31634] kobject: 'tx-0' (00000000e924aab1): auto cleanup 'remove' event [ 2268.160777][T31827] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x246, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2268.203709][T31634] kobject: 'tx-0' (00000000e924aab1): kobject_uevent_env [ 2268.212502][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2268.231271][T31634] kobject: 'tx-0' (00000000e924aab1): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2268.242538][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2268.253810][T31634] kobject: 'tx-0' (00000000e924aab1): auto cleanup kobject_del [ 2268.263506][T32457] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2268.263815][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2268.273819][T32457] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2268.278240][T31634] kobject: 'tx-0' (00000000e924aab1): calling ktype release [ 2268.297504][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2268.301496][T31634] kobject: 'tx-0': free name [ 2268.309927][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2268.315705][T31634] kobject: 'queues' (0000000031f995f0): kobject_cleanup, parent (null) [ 2268.320429][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2268.331614][T31634] kobject: 'queues' (0000000031f995f0): calling ktype release [ 2268.341698][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2268.354346][T31634] kobject: 'queues' (0000000031f995f0): kset_release [ 2268.361169][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2268.362149][T31634] kobject: 'queues': free name [ 2268.372111][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2268.383334][T31634] kobject: 'ax0' (00000000214c72fe): kobject_uevent_env [ 2268.384792][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2268.392646][T31634] kobject: 'ax0' (00000000214c72fe): fill_kobj_path: path = '/devices/virtual/net/ax0' [ 2268.402871][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2268.419310][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2268.439644][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2268.443147][T32457] XFS (loop1): Invalid superblock magic number 17:02:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x50b000, 0x0, 0x0, 0x0) 17:02:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x161f}, 0x28) 17:02:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xc000000000, 0x0, 0x0, 0x0) 17:02:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x3}, 0x4) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) getsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000080)={@local, @multicast2}, &(0x7f00000000c0)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 17:02:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x60000, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000140)={0x8, @pix_mp={0x9, 0x1, 0x7f7a5f5f, 0x3, 0x3, [{0x7fffffff, 0x5}, {0x4, 0x10001}, {0x6, 0x4}, {0x4, 0x8}, {0xfff, 0xafa}, {0x80000001, 0x2}, {0x8, 0x8001}, {0x80000001, 0x4}], 0x9, 0xfff, 0xf, 0x1, 0x3}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffffffa, 0x2000) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r4, 0x0, 0x10000000000443) [ 2268.447056][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2268.463725][T31634] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2268.473771][T31634] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:41 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1620}, 0x28) [ 2268.536762][T32517] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2268.538153][ T3877] kobject: 'loop4' (00000000b27cf846): kobject_uevent_env [ 2268.560364][ T3877] kobject: 'loop4' (00000000b27cf846): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2268.573659][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env 17:02:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') set_mempolicy(0x0, &(0x7f00000007c0)=0x401, 0x10001) sendfile(r1, r3, 0x0, 0x10000000000443) getresuid(&(0x7f0000000200), &(0x7f0000000300)=0x0, &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x3, &(0x7f0000000280)=[{&(0x7f0000000140)="2832836a93ad2e98e8509a68263f8a7e8b3fab424103cfcada0dccb0d6fdbe84e6b152f2b8f6e460a71401c68b107aa5ea4a01926c06b2780c655eee87ef42cf592421e42e5d0e6fc6dcca7ab16d4e0c726205c58178ea3f1db4962053b47d3afce616a6a8b66771240917723f6fe6aaeef4d4c2095aaed18a19d5e03a4dc715bb51ca1e5c246c5d2242131c8095861fa268e9852aae2d2e35c8a4326b20e1c2efd8fa89ba3aafcbb274de822bd949a003cea73c", 0xb4, 0x100000000}, {&(0x7f0000000080)="f11073220f746fd76b27e3e6c819b97257adec25a64415dc3f66de5c4bb56ef71549ed3f70458e5bfe63f3a54d2298c9c0593954ec008e0069b4a0bedeec3936c5812f8f6772dbdcdefb9575346012e142d780721d372eb2e29dedf7f62bcef73c47b740149eee96b346ba951971e2ae83109c4bb9038484f1b4c6b4", 0x7c, 0x40}, {0xfffffffffffffffd, 0x0, 0xb66}], 0x100000, &(0x7f0000000680)={[{@creator={'creator', 0x3d, "c3006168"}}, {@barrier='barrier'}, {@force='force'}, {@decompose='decompose'}, {@barrier='barrier'}, {@decompose='decompose'}, {@part={'part', 0x3d, 0xffffffff}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r4}}], [{@uid_eq={'uid', 0x3d, r5}}, {@obj_user={'obj_user'}}, {@obj_role={'obj_role'}}, {@dont_measure='dont_measure'}, {@hash='hash'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, 'posix_acl_access:{]md5sum'}}, {@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', r6}}, {@euid_eq={'euid', 0x3d, r7}}]}) [ 2268.577878][T32517] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2268.583276][T32544] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2268.598764][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2268.626068][T32544] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:42 executing program 2: [ 2268.663756][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2268.686034][T32517] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2268.693544][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2268.693857][T32544] kobject: 'ax0' (0000000001ae7f4b): kobject_add_internal: parent: 'net', set: 'devices' 17:02:42 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1621}, 0x28) 17:02:42 executing program 2: [ 2268.703844][T32517] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2268.706418][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2268.744167][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2268.756700][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2268.770521][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2268.780302][T32544] kobject: 'ax0' (0000000001ae7f4b): kobject_uevent_env [ 2268.792518][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2268.799925][T32517] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2268.807558][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2268.818340][T32517] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2268.823944][T32544] kobject: 'ax0' (0000000001ae7f4b): fill_kobj_path: path = '/devices/virtual/net/ax0' [ 2268.844533][T32457] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2268.856827][T32457] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:02:42 executing program 2: [ 2268.865333][T32517] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2268.874071][T32517] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2268.884446][T32544] kobject: 'queues' (000000008d5bc326): kobject_add_internal: parent: 'ax0', set: '' [ 2268.905162][T32457] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2268.913907][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2268.921112][T32457] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2268.944908][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2268.952773][T32544] kobject: 'queues' (000000008d5bc326): kobject_uevent_env [ 2268.955879][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2268.965142][T32544] kobject: 'queues' (000000008d5bc326): kobject_uevent_env: filter function caused the event to drop! [ 2268.969898][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2268.991498][T32544] kobject: 'rx-0' (00000000e9f74519): kobject_add_internal: parent: 'queues', set: 'queues' [ 2268.992565][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2269.005632][T32544] kobject: 'rx-0' (00000000e9f74519): kobject_uevent_env [ 2269.008968][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2269.018684][T32544] kobject: 'rx-0' (00000000e9f74519): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2269.026747][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.040194][T32544] kobject: 'tx-0' (00000000f5f0f5d9): kobject_add_internal: parent: 'queues', set: 'queues' [ 2269.044320][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.058308][T32544] kobject: 'tx-0' (00000000f5f0f5d9): kobject_uevent_env [ 2269.065178][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2269.072304][T32544] kobject: 'tx-0' (00000000f5f0f5d9): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2269.078892][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2269.079408][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2269.107274][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2269.117248][T32544] mkiss: ax0: crc mode is auto. 17:02:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x264, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2269.129506][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2269.137144][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2269.145626][T32544] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.157763][T32544] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2269.168544][ T7800] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.178968][ T7800] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.191034][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.198350][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.241883][T32522] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.249788][ T571] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.259565][ T571] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.270277][T32522] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2269.295584][T32522] kobject: 'rx-0' (00000000e9f74519): kobject_cleanup, parent 000000008d5bc326 [ 2269.304824][T32522] kobject: 'rx-0' (00000000e9f74519): auto cleanup 'remove' event [ 2269.312693][T32522] kobject: 'rx-0' (00000000e9f74519): kobject_uevent_env [ 2269.320215][T32522] kobject: 'rx-0' (00000000e9f74519): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2269.331384][ T571] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.339812][T32522] kobject: 'rx-0' (00000000e9f74519): auto cleanup kobject_del [ 2269.347777][ T571] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.358356][T32522] kobject: 'rx-0' (00000000e9f74519): calling ktype release [ 2269.366473][T32522] kobject: 'rx-0': free name [ 2269.366993][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.371322][T32522] kobject: 'tx-0' (00000000f5f0f5d9): kobject_cleanup, parent 000000008d5bc326 [ 2269.381191][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.389279][T32522] kobject: 'tx-0' (00000000f5f0f5d9): auto cleanup 'remove' event [ 2269.406768][T32522] kobject: 'tx-0' (00000000f5f0f5d9): kobject_uevent_env [ 2269.413999][T32522] kobject: 'tx-0' (00000000f5f0f5d9): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2269.425423][T32522] kobject: 'tx-0' (00000000f5f0f5d9): auto cleanup kobject_del [ 2269.425464][ T571] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.433020][T32522] kobject: 'tx-0' (00000000f5f0f5d9): calling ktype release [ 2269.447895][T32522] kobject: 'tx-0': free name [ 2269.453007][T32522] kobject: 'queues' (000000008d5bc326): kobject_cleanup, parent (null) [ 2269.462488][T32522] kobject: 'queues' (000000008d5bc326): calling ktype release [ 2269.463095][ T571] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.470266][T32522] kobject: 'queues' (000000008d5bc326): kset_release [ 2269.487227][T32522] kobject: 'queues': free name [ 2269.492373][T32522] kobject: 'ax0' (0000000001ae7f4b): kobject_uevent_env [ 2269.500308][T32522] kobject: 'ax0' (0000000001ae7f4b): fill_kobj_path: path = '/devices/virtual/net/ax0' [ 2269.500480][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.517417][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:02:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x70a000, 0x0, 0x0, 0x0) 17:02:42 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1622}, 0x28) 17:02:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x400000000000, 0x0, 0x0, 0x0) 17:02:42 executing program 2: 17:02:42 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x80, 0x80800) r1 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x800) r2 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={r1, r2}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000300)={0x0, 0xec}, &(0x7f0000000340)=0x8) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000400)=0x4, &(0x7f0000000440)=0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000380)={r5, 0xff}, &(0x7f00000003c0)=0x8) r6 = semget$private(0x0, 0x3, 0x144) semctl$GETZCNT(r6, 0x3, 0xf, &(0x7f0000000040)=""/154) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000540)={0x0, 0x0, 0x10001, 0x3ff}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000580)={0x400, r7}) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r4, r9, 0x0, 0x10000000000443) 17:02:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x280, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2269.556638][T32522] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.563974][T32522] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:42 executing program 2: [ 2269.614458][ T7800] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.621677][ T7800] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.642692][ T576] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.669013][ T3877] kobject: 'loop4' (00000000b27cf846): kobject_uevent_env [ 2269.673114][ T576] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2269.686531][ T604] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.693512][ T604] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2269.699156][ T615] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.713249][ T615] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.728826][ T3877] kobject: 'loop4' (00000000b27cf846): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2269.741147][ T576] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.752128][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2269.759543][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' 17:02:43 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1623}, 0x28) 17:02:43 executing program 2: 17:02:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2000, 0x0) bind$llc(r1, &(0x7f00000000c0)={0x1a, 0x30d, 0x1, 0x1, 0x4e, 0x80000000, @local}, 0x10) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r5, 0x0, 0x10000000000443) [ 2269.783970][ T576] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2269.799784][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2269.813710][ T604] kobject: 'ax0' (00000000cf9e1ecf): kobject_add_internal: parent: 'net', set: 'devices' [ 2269.827746][ T615] XFS (loop1): Invalid superblock magic number [ 2269.834023][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2269.852769][ T604] kobject: 'ax0' (00000000cf9e1ecf): kobject_uevent_env [ 2269.860298][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2269.867650][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' 17:02:43 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1624}, 0x28) 17:02:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x50b000, 0x0, 0x0, 0x0) [ 2269.878147][ T604] kobject: 'ax0' (00000000cf9e1ecf): fill_kobj_path: path = '/devices/virtual/net/ax0' [ 2269.893443][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2269.900240][ T576] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.914910][ T604] kobject: 'queues' (00000000b0026886): kobject_add_internal: parent: 'ax0', set: '' [ 2269.921923][ T576] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2269.927966][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2269.938094][ T604] kobject: 'queues' (00000000b0026886): kobject_uevent_env [ 2269.960720][ T866] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.968408][ T866] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2269.981615][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2269.989530][ T576] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2269.990870][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2269.999225][ T604] kobject: 'queues' (00000000b0026886): kobject_uevent_env: filter function caused the event to drop! [ 2270.009125][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2270.022380][ T576] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.036125][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2270.047009][ T604] kobject: 'rx-0' (00000000c6278f25): kobject_add_internal: parent: 'queues', set: 'queues' [ 2270.059058][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2270.063829][ T604] kobject: 'rx-0' (00000000c6278f25): kobject_uevent_env [ 2270.067099][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2270.083597][ T604] kobject: 'rx-0' (00000000c6278f25): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2270.086666][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2270.101976][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2270.119891][ T604] kobject: 'tx-0' (00000000381fe587): kobject_add_internal: parent: 'queues', set: 'queues' [ 2270.125516][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2270.131039][ T604] kobject: 'tx-0' (00000000381fe587): kobject_uevent_env [ 2270.137636][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2270.155189][ T604] kobject: 'tx-0' (00000000381fe587): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2270.177058][ T604] mkiss: ax0: crc mode is auto. [ 2270.179696][ T836] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.194852][ T836] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.209512][ T604] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.224449][ T615] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2270.233932][ T604] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.244743][ T615] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2270.267631][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2270.275102][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2270.287032][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2270.294484][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2270.305555][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2270.314542][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2270.322618][ T604] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.329419][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2270.331972][ T604] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.339740][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2270.366142][ T604] kobject: 'rx-0' (00000000c6278f25): kobject_cleanup, parent 00000000b0026886 [ 2270.375934][ T604] kobject: 'rx-0' (00000000c6278f25): auto cleanup 'remove' event [ 2270.383836][ T604] kobject: 'rx-0' (00000000c6278f25): kobject_uevent_env [ 2270.392254][ T604] kobject: 'rx-0' (00000000c6278f25): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2270.403268][ T604] kobject: 'rx-0' (00000000c6278f25): auto cleanup kobject_del [ 2270.411125][ T604] kobject: 'rx-0' (00000000c6278f25): calling ktype release [ 2270.418548][ T604] kobject: 'rx-0': free name [ 2270.423263][ T604] kobject: 'tx-0' (00000000381fe587): kobject_cleanup, parent 00000000b0026886 [ 2270.432457][ T604] kobject: 'tx-0' (00000000381fe587): auto cleanup 'remove' event [ 2270.440742][ T604] kobject: 'tx-0' (00000000381fe587): kobject_uevent_env [ 2270.448020][ T604] kobject: 'tx-0' (00000000381fe587): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2270.459157][ T604] kobject: 'tx-0' (00000000381fe587): auto cleanup kobject_del [ 2270.467044][ T604] kobject: 'tx-0' (00000000381fe587): calling ktype release [ 2270.474982][ T604] kobject: 'tx-0': free name [ 2270.479928][ T604] kobject: 'queues' (00000000b0026886): kobject_cleanup, parent (null) [ 2270.489421][ T604] kobject: 'queues' (00000000b0026886): calling ktype release [ 2270.497589][ T604] kobject: 'queues' (00000000b0026886): kset_release [ 2270.504561][ T604] kobject: 'queues': free name [ 2270.509877][ T604] kobject: 'ax0' (00000000cf9e1ecf): kobject_uevent_env [ 2270.517867][ T604] kobject: 'ax0' (00000000cf9e1ecf): fill_kobj_path: path = '/devices/virtual/net/ax0' 17:02:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x713000, 0x0, 0x0, 0x0) 17:02:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) 17:02:43 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1625}, 0x28) 17:02:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0)=0x1f, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000180)={0xfffffffffffffffb, 0x6, 0x1}, 0xc) ioctl(r1, 0x80000001, &(0x7f0000000200)="0adc1f123c123f3188b070") r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) r4 = syz_open_procfs(r3, &(0x7f0000000280)='net/routeO9u\x01\xc7E\xf3}[.\x17\x17T\x80N\x95\xff5\x96\'\xda\x8e|7\x0e\x1f\xf8\x19\xbal\xf2\xcb\x9cT\xa9\xc0r\xd8\xe7G\x87\x97\x9c\r\xe1\xb9\xc9\x95z\xf9\x9f\xf7$\x15P\xf3pY\x9d\xc6C\x13\x833\x9d\t\xadW;\xc6\x9a\x98\xd1\xd0\x97\xcb\x99\xe4\x98\xdf\x93\x9a\xc7<2\x1en4*\xe4\x10\xdb\xfb\x17|\xecc\xc7u\xe9\x8bx\xea\xb1\xe7k\x18\x195V:\xf6\x15\xc0\xa1\xf4\x95d\xf8\x82D\x94\xdc@x\xa78??\x90\x93{\x8e\xcaEe\x17\xc7\x88\x85\xdd\x97\xe4\x15\x9d\xbdb6xg\xb8\xc0\xa7\xf3\xe9\x7f\x05[\t Qv\xefL+]\x15zk\x1f\xd3[\xff\x81^\x13RU<\x95\xe13\x15') ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000000)={0x3, 0xffff, 0x1, 'queue0\x00', 0x2ad4cdf1}) sendfile(r0, r4, 0x0, 0x10000000000443) 17:02:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x50b000, 0x0, 0x0, 0x0) 17:02:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x2ae, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2270.564829][ T604] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.572001][ T604] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.627574][ T1130] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.630958][ T1137] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.654324][ T1132] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2270.661593][ T1132] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:02:44 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1626}, 0x28) [ 2270.665599][ T1130] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.682342][ T1137] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.744295][ T1132] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2270.758300][ T1127] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.768838][ T1132] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2270.775374][ T1130] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env 17:02:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(xeta-generic)\x00'}, 0xffffff0f) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f00000004c0)={0xd1, 0xa, 0x0, [{0x81, 0x5, 0x0, 0x5, 0x2, 0x7, 0x6}, {0x5, 0x2d59, 0x7, 0xfc0f, 0x7c, 0xff, 0x5}, {0x7, 0x51a, 0x7ff, 0x0, 0x80, 0x3, 0x5}, {0x1, 0x80000000, 0xffff, 0x3f, 0x401, 0x7f, 0xffffffffffffff01}, {0x3, 0x1, 0x1, 0x7, 0x8, 0x9, 0x3}, {0x7fff, 0x3, 0x5, 0x40, 0x2, 0xfffffffffffffff7, 0x3}, {0x5, 0x1, 0x5, 0x3, 0x1, 0x8000, 0xa2c}, {0xe524, 0x84, 0x10001, 0x6400000000000000, 0x5, 0x7fff, 0xfe9}, {0xfffffffffffff32c, 0x4, 0x9, 0x5, 0x7a7a, 0x6, 0xc22}, {0x400, 0xfffffffffffffff8, 0x8, 0xa861, 0x1000, 0x20}]}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) open_by_handle_at(r2, &(0x7f0000000140)={0xcb, 0x540000000000, "83b0af08e33e5b6f8d327b43e62e0641d73326dc45070cf2e9519a09bc02ac61abeb88f3a4f68d5581e5a2b7d00a518fb6599b79fd6fdbbd8399761427450aec1e22f81bc6094557030d2209dae770cbad6b3562cae8e4e2b4732f17fd7dbf36120339ed545abe774650d0e4e8c9e5317c1caea266479c2074d70cebd6f3a6f79bcf918ed3fa7c3d2bde5fe742c7ebbaf633c3026389ae5f732adf17cd46cae471e8b2b7efb701f03c007f426348b3192daabb67caf73f405073e723c472b0373c9ff1"}, 0x101000) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000000), 0x84000) [ 2270.782865][ T1127] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.789495][ T1137] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.809306][ T3877] kobject: 'loop4' (00000000b27cf846): kobject_uevent_env [ 2270.816578][ T3877] kobject: 'loop4' (00000000b27cf846): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2270.832017][ T1137] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x2b0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x50b000, 0x0, 0x0, 0x0) [ 2270.858364][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2270.861543][ T1367] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.871382][ T1130] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.895620][ T1367] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:44 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1627}, 0x28) [ 2270.915377][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2270.927151][ T1406] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2270.935687][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2270.947011][ T1406] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2270.948691][ T1367] kobject: 'ax0' (00000000b9bf1cfb): kobject_add_internal: parent: 'net', set: 'devices' [ 2270.966296][ T1130] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2270.968012][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2270.979851][ T1130] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2270.987059][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2271.002831][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:02:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x740000000000, 0x0, 0x0, 0x0) [ 2271.013438][ T1406] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2271.022515][ T1367] kobject: 'ax0' (00000000b9bf1cfb): kobject_uevent_env [ 2271.031408][ T1367] kobject: 'ax0' (00000000b9bf1cfb): fill_kobj_path: path = '/devices/virtual/net/ax0' [ 2271.031761][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2271.041500][ T1406] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2271.050804][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2271.059286][ T1367] kobject: 'queues' (0000000050727134): kobject_add_internal: parent: 'ax0', set: '' [ 2271.080021][ T1367] kobject: 'queues' (0000000050727134): kobject_uevent_env [ 2271.088138][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2271.099967][ T1477] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.112979][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2271.115268][ T1367] kobject: 'queues' (0000000050727134): kobject_uevent_env: filter function caused the event to drop! [ 2271.126400][ T1481] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.143584][ T1477] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.153684][ T1481] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.163889][ T1367] kobject: 'rx-0' (00000000490e0065): kobject_add_internal: parent: 'queues', set: 'queues' [ 2271.166541][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2271.182182][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2271.196459][ T1367] kobject: 'rx-0' (00000000490e0065): kobject_uevent_env [ 2271.209849][ T1367] kobject: 'rx-0' (00000000490e0065): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2271.221960][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2271.224482][ T1367] kobject: 'tx-0' (00000000d36ff680): kobject_add_internal: parent: 'queues', set: 'queues' [ 2271.239765][ T1481] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.246867][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2271.258738][ T1367] kobject: 'tx-0' (00000000d36ff680): kobject_uevent_env [ 2271.264228][ T1476] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.269242][ T1367] kobject: 'tx-0' (00000000d36ff680): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2271.284446][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2271.287496][ T1367] mkiss: ax0: crc mode is auto. [ 2271.291691][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2271.292136][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2271.314257][ T1476] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.319736][ T1367] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.333363][ T1367] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.344189][ T1481] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.350990][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2271.369530][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2271.377349][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2271.388226][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2271.395472][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2271.406306][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2271.413555][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2271.419756][ T1362] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.435413][ T1362] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.458680][ T1362] kobject: 'rx-0' (00000000490e0065): kobject_cleanup, parent 0000000050727134 [ 2271.470798][ T1362] kobject: 'rx-0' (00000000490e0065): auto cleanup 'remove' event [ 2271.476713][ T1490] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.479219][ T1362] kobject: 'rx-0' (00000000490e0065): kobject_uevent_env [ 2271.495679][ T1362] kobject: 'rx-0' (00000000490e0065): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2271.504256][ T1490] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.508128][ T1362] kobject: 'rx-0' (00000000490e0065): auto cleanup kobject_del [ 2271.528096][ T1362] kobject: 'rx-0' (00000000490e0065): calling ktype release [ 2271.536474][ T1362] kobject: 'rx-0': free name [ 2271.541254][ T1362] kobject: 'tx-0' (00000000d36ff680): kobject_cleanup, parent 0000000050727134 [ 2271.553302][ T1362] kobject: 'tx-0' (00000000d36ff680): auto cleanup 'remove' event [ 2271.556169][ T1490] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.561701][ T1362] kobject: 'tx-0' (00000000d36ff680): kobject_uevent_env [ 2271.578208][ T1362] kobject: 'tx-0' (00000000d36ff680): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2271.584211][ T1490] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.589631][ T1362] kobject: 'tx-0' (00000000d36ff680): auto cleanup kobject_del [ 2271.609663][ T1362] kobject: 'tx-0' (00000000d36ff680): calling ktype release [ 2271.617335][ T1362] kobject: 'tx-0': free name [ 2271.622068][ T1362] kobject: 'queues' (0000000050727134): kobject_cleanup, parent (null) [ 2271.634665][ T1362] kobject: 'queues' (0000000050727134): calling ktype release [ 2271.642311][ T1362] kobject: 'queues' (0000000050727134): kset_release [ 2271.651196][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2271.656361][ T1362] kobject: 'queues': free name [ 2271.659551][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2271.667545][ T1362] kobject: 'ax0' (00000000b9bf1cfb): kobject_uevent_env [ 2271.681700][ T1362] kobject: 'ax0' (00000000b9bf1cfb): fill_kobj_path: path = '/devices/virtual/net/ax0' 17:02:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x740000, 0x0, 0x0, 0x0) 17:02:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000080)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r2}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e22, @remote}], 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x2) sendfile(r1, r4, 0x0, 0x10000000000443) 17:02:45 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1628}, 0x28) 17:02:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x2d4, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) 17:02:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x7f98d09d4000, 0x0, 0x0, 0x0) [ 2271.764378][ T1362] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.773507][ T1362] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.830151][ T1808] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.834916][ T1805] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2271.847196][ T1805] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2271.859645][ T1810] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.868299][ T1808] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:45 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1629}, 0x28) 17:02:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x10) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") getpid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)=0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000080)={0x1, 0x2, 0xfffffffffffffff8, 0x2, 0x100000001, 0x9, 0x8}) r5 = syz_open_procfs(r4, &(0x7f0000000240)='net/route\x00') sendfile(r2, r5, 0x0, 0x10000000000443) [ 2271.888353][ T3877] kobject: 'loop4' (00000000b27cf846): kobject_uevent_env [ 2271.895724][ T1810] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.908900][ T1817] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.916385][ T3877] kobject: 'loop4' (00000000b27cf846): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2271.937159][ T1810] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.944246][ T1817] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2271.956895][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2271.965469][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2271.986371][ T1806] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2271.993775][ T1817] kobject: 'ax0' (00000000cc290e6b): kobject_add_internal: parent: 'net', set: 'devices' [ 2272.003826][ T1810] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.013788][ T1805] XFS (loop1): Invalid superblock magic number [ 2272.014468][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2272.027422][ T1806] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:45 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x162a}, 0x28) [ 2272.034630][ T1817] kobject: 'ax0' (00000000cc290e6b): kobject_uevent_env [ 2272.041964][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2272.075153][ T1817] kobject: 'ax0' (00000000cc290e6b): fill_kobj_path: path = '/devices/virtual/net/ax0' 17:02:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) [ 2272.086735][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2272.090141][ T1810] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.095347][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2272.111609][ T1817] kobject: 'queues' (00000000d7aa618a): kobject_add_internal: parent: 'ax0', set: '' [ 2272.124965][ T1810] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.134367][ T1817] kobject: 'queues' (00000000d7aa618a): kobject_uevent_env [ 2272.145210][ T1952] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.153085][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2272.160525][ T1817] kobject: 'queues' (00000000d7aa618a): kobject_uevent_env: filter function caused the event to drop! [ 2272.172139][ T1952] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.178382][ T1810] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.182204][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2272.199629][ T1817] kobject: 'rx-0' (0000000025c50f89): kobject_add_internal: parent: 'queues', set: 'queues' [ 2272.210864][ T1817] kobject: 'rx-0' (0000000025c50f89): kobject_uevent_env 17:02:45 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x162b}, 0x28) [ 2272.233953][ T1810] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.238053][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2272.273653][ T1817] kobject: 'rx-0' (0000000025c50f89): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' 17:02:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x7fffffffefff, 0x0, 0x0, 0x0) [ 2272.285548][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2272.309322][ T1951] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.317080][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2272.325858][ T1951] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.336092][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2272.339434][ T2141] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.360166][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2272.364664][ T1817] kobject: 'tx-0' (000000000d54c41d): kobject_add_internal: parent: 'queues', set: 'queues' [ 2272.367942][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2272.381104][ T2141] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.406372][ T1817] kobject: 'tx-0' (000000000d54c41d): kobject_uevent_env [ 2272.412792][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2272.415509][ T2141] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.428198][ T1817] kobject: 'tx-0' (000000000d54c41d): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2272.441779][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2272.453790][ T2141] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.464420][ T1817] mkiss: ax0: crc mode is auto. [ 2272.483952][ T1817] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.491598][ T1805] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2272.499112][ T1805] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2272.510551][ T1817] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.526292][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2272.533464][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2272.547413][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2272.554827][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2272.568630][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2272.576031][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2272.578786][ T2140] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.596522][ T2140] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.634480][ T1864] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.641715][ T1864] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.652419][ T2140] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.660266][ T2140] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.686651][ T1864] kobject: 'rx-0' (0000000025c50f89): kobject_cleanup, parent 00000000d7aa618a [ 2272.696099][ T1864] kobject: 'rx-0' (0000000025c50f89): auto cleanup 'remove' event [ 2272.704037][ T1864] kobject: 'rx-0' (0000000025c50f89): kobject_uevent_env [ 2272.715856][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2272.718483][ T1864] kobject: 'rx-0' (0000000025c50f89): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2272.723025][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2272.744981][ T1864] kobject: 'rx-0' (0000000025c50f89): auto cleanup kobject_del [ 2272.752684][ T1864] kobject: 'rx-0' (0000000025c50f89): calling ktype release [ 2272.760467][ T1864] kobject: 'rx-0': free name [ 2272.765430][ T1864] kobject: 'tx-0' (000000000d54c41d): kobject_cleanup, parent 00000000d7aa618a [ 2272.774770][ T1864] kobject: 'tx-0' (000000000d54c41d): auto cleanup 'remove' event [ 2272.782688][ T1864] kobject: 'tx-0' (000000000d54c41d): kobject_uevent_env [ 2272.790559][ T1864] kobject: 'tx-0' (000000000d54c41d): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2272.801946][ T1864] kobject: 'tx-0' (000000000d54c41d): auto cleanup kobject_del [ 2272.809956][ T1864] kobject: 'tx-0' (000000000d54c41d): calling ktype release [ 2272.817623][ T1864] kobject: 'tx-0': free name [ 2272.822336][ T1864] kobject: 'queues' (00000000d7aa618a): kobject_cleanup, parent (null) [ 2272.831943][ T1864] kobject: 'queues' (00000000d7aa618a): calling ktype release [ 2272.839812][ T1864] kobject: 'queues' (00000000d7aa618a): kset_release [ 2272.846851][ T1864] kobject: 'queues': free name [ 2272.852077][ T1864] kobject: 'ax0' (00000000cc290e6b): kobject_uevent_env [ 2272.859472][ T1864] kobject: 'ax0' (00000000cc290e6b): fill_kobj_path: path = '/devices/virtual/net/ax0' 17:02:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x80ffff, 0x0, 0x0, 0x0) 17:02:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) 17:02:46 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x162c}, 0x28) 17:02:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="803ff8ffffffffffffff038a7e7164006cff9900000000042800000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x2e4, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x940000000000, 0x0, 0x0, 0x0) [ 2272.906925][ T1864] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.914023][ T1864] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2272.973190][ T2353] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.980846][ T2350] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2272.982475][ T2349] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2272.988329][ T2350] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2273.005921][ T2353] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:46 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x162d}, 0x28) [ 2273.034247][ T2349] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.036784][ T2396] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2273.048993][ T2346] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2273.057328][ T3877] kobject: 'loop4' (00000000b27cf846): kobject_uevent_env [ 2273.068261][ T3877] kobject: 'loop4' (00000000b27cf846): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2273.079160][ T2396] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.089031][ T2346] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2273.104991][ T2350] EXT4-fs (loop5): Unsupported filesystem blocksize 262144 (40 log_block_size) [ 2273.116517][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2273.130310][ T2352] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2273.137822][ T2346] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2273.145302][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2273.155919][ T2346] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2273.166513][ T2352] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.171793][ T2349] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env 17:02:46 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x162e}, 0x28) 17:02:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) [ 2273.181981][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2273.203425][ T2396] kobject: 'ax0' (00000000a7b9b50b): kobject_add_internal: parent: 'net', set: 'devices' [ 2273.205687][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:02:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x2f6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2273.228326][ T2349] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.238603][ T2350] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2273.249561][ T2396] kobject: 'ax0' (00000000a7b9b50b): kobject_uevent_env [ 2273.258263][ T2350] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2273.272103][ T2396] kobject: 'ax0' (00000000a7b9b50b): fill_kobj_path: path = '/devices/virtual/net/ax0' [ 2273.286264][ T2396] kobject: 'queues' (0000000011f0ea81): kobject_add_internal: parent: 'ax0', set: '' [ 2273.301849][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2273.323111][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' 17:02:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCSBRK(r2, 0x5427) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000040)=0x0) r5 = getpgrp(r4) r6 = syz_open_procfs(r5, &(0x7f0000000000)='net/route\x00') r7 = getuid() fstat(r3, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001740)={0x0, 0x0}, &(0x7f0000001780)=0xc) r10 = getegid() r11 = geteuid() stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001b80)=0x0, &(0x7f0000001bc0), &(0x7f0000001c00)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001c40)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001d40)=0xe8) getgroups(0x5, &(0x7f0000001d80)=[0xffffffffffffffff, 0xee01, 0x0, 0xee00, 0xffffffffffffffff]) fstat(r3, &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000001ec0)=0x0, &(0x7f0000001f00), &(0x7f0000001f40)) r20 = getgid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001f80)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002080)=0xe8) lstat(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000002180)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000002280)=0xe8) r24 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000022c0)={0x0, 0x0}, &(0x7f0000002300)=0xc) r26 = getgid() lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900)={0x0, 0x0, 0x0}, &(0x7f0000002940)=0xc) r29 = getuid() getresgid(&(0x7f0000002980), &(0x7f00000029c0)=0x0, &(0x7f0000002a00)) sendmmsg$unix(r2, &(0x7f0000002a80)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000540)="a30640398f9b1e94d8edc42bc7c2e17e5516f3e9411d28258503601d40acb1932f1fa10d1e748b4e8213b7b907f3b0fe39451f5890b33ba0c9e66d6bfdb52b988208bb5ab822bdf7a8898e81cc6e40245fe74e23a3a394fec73dde35430d84a17318ca9ea9b454c4dc4045f178fb2e9042b1119cf1ae5d31b87f9d690a25c6557dd9ff63f0936df943185e3f72da7f58f2a2a1016785f90181b7b3b2854156632c73cb92fb5df6941e08f1ce87664617a397b181d6dc669c07b0ee85ecc2d9239b44b70e66ec8268050c0402b2b0471e547a9831fd541a2edbbee9dec689f0b6d8631a0187f142b7c7efa087fd5273c00c7a213da8cb2c561bf2d7c3ef2e6d6a5bd9e9a6a7fb7063d08135a8e584b7ef3dcd678ef906169e89312f9d993f112debcc96970e1a064e0fda7444f26be7486c26a563c4e2fc62ead804536b77c93e9a21dc0619f96dc186cef4524676215509c55f835e4c19b13b4b271644e2e058fb9753a228bd2cf039acafe5b689a63962838b7bd80b8f80c22232d2a10cc721af08de4c29de9912005011db5582ff8005d7a98dd78e204ba4f85cb0e9a5a3b2221b7c4bf183033dd7a590e505ff1c0fa5d7c690d9e5ec60136831780e0506d3c79b0c41d7a332b6c76e281d470415f9920856f4afb8b444c8f50a8c94924bf4fe2faad06246619c17806571f1bf17fd92171ce1286c56b0f55276a46b415d7d24ff6e614a4c2f68796974a5efcd3cb6b210b8f1d896c235cff7553c7f237c44b38634c955eaf693ca4d3d6ad1e6c0df45371f59a827481c11808320261b002570d6b93e556dc02f8a9e2fa56b1c49b8a94f5f1f65f271c157461a17f129c2c45b4afeef1f7ce1f29e0077eed92561366eee8095bf51e3b2f499c9f091681dd6580390aaf0645a129479dc39c5510b0066cf606e00647e62f96ebb0f91801b8188c13262b09486c8d43379281e29ca039a703f20ee8681cb7bb5dad4f38aa09027707670442ea9c8a05959a9733c964984d837fdf035d5eb3665d833420e5a93d3926c46881cb1f85d26357d6613ea3e96a03011565b48e353cb33ebb3472344715eaa183f1f0074b8e621fd0ab1590114d680443db0e8371968ef6168c8f0d7fb6a1e1ede5afec742d3f908edc641d0bf4bb7321e6f19d151b32c03f3c19c98425f38a64aeade100cb10880739adc0d9f9114610981c4dc2261621ed4d987a59192f6071ad65642428ceeff9ba9190092c2d8f8f5351b6a23ce9e112eea534c0204868fafc6a0f38c69debb5b78b189fcfd67558decc644ea98cd48b08e90a52243d67a686e250531edc00285b2d52446e84490aec945c214fc49be0aff81c69bee1268dd1b76bb772a9a915d9ac30313b3eb4e7cd4af6cead22bfab63b5d4551632560dc8947d53b48402db5418e5f6a7d1f44d5a86756f1b9d61e220ac60d5913eb229559991f88e4b039eacf56c91b37ef84fd2b7f14dde95f2f031084209c201758e87067b0a5418536667ec283e0515eced7929fc7bd4d5f8e9a38bb40ff6a1c19787f0b3052b7251dc30abe2fb05e406112a19ad362825573c2d117010c0df35eae39ea3d45960751ec109039b54984ce9ddd0b253998c96d2218edcc86c68c2ee2ecc8e5b860386ff7eeca9883225e2eb6f7e3b174108904d75b9d215fb63bbcc34d1c51e3193e3865fa4639f581633c6dda2f7d4b4c05b12b4876316f45d7630d8fbbe4c28ceb23e36b36f0b41c83d2b9c1ce6b54401b2cfa7a701c07a45edbb3d6e644e6c70cf04cc13bc414b1d225c45aec4144f758d1aed1c217209ddfd0d95c703c896be2f548ed0d617d9834daa8172414d563b8a3c38b607e3991a833b3a6f31f6d3793d36b995909f9d41e078dbd5b9d157d74c744c01195154d98e7ea898bfceef2cac5a1857651e0307b7275c1635ffb85a2d864e64f308d5a777f80131652b9838060241bd22bd78c52310f977003a534f87019dce78ba4d36862299ca44ef933a1b63464e8ac183ef9aa9efbbe1a99e4642b3094870df8bcc9a9189408ef637c90fd9eb3693db27318453e87293eb345381211ec9fd7cceb887d12c31c710a394ba05a444808f4483dcd9929fadfb2619d190e36b839f43bab329959b45ad432fc76a5ab036c196ef9ebc8791bd0ddb30fbd7edd675e08eb2c3a93ea601e2e04f9de8484f609ff652e8e991f1e8538d329edf4cab3a84f900111f61fd29c3f70f5153d878f733125df24086313def29932490ec9dfaa6d1e35fa91d49396e656ab2a09d31f7c1335926e8f52df7cb6c511edd06892d065cc5311cc0fe0eb44acbf8da8bbaf6a687cdf74abff28f33c19b28370a93b6f4cefe43aa1764716452a6b5eeedb60c8dd02a13ff5c964619b58c13beeefa4e8163558722aa92c10d2be022736efc3376b381ddc4ab3676a71b9f052ceb5b4754aa6d2c67f28c56fd5ba962423a226542050ba265a1ee95609d3a76eb84811cfcf807620ba620eb23febd09508d8ce3b5b5369622a7c0b286b5e37d3d243cd6222552bbc39e5cafeea1bec74b7c4175cdf6b279915c268ab6a34b62526fab5654fd7c93c1e5504e11123f60c582aba68c5d262bad3c48b27dc5a9cef90ada396188f0192faeea7f9a5fe897f0a4a8ef45c3f43fa557e16d78e3e2859fcccea4019f2056cca008e68e798ba5adaddc90f6999a6fb28f123b54ffc4f82190839e9fc10b0921b9e1f962bcfec1e1dcab334446af771f8fc145d94baf2af1e0070761575ea8cc880c55254651e63c16541841992a7cd338d0927967496670d851f5191e2b89eef600621edf219156ea1e18b019dd7e15df02b6ba4cd2bb0010a2dca2789b2e4c3ff6ce389aa89dbd2a1f5290dc82b141b787ca797a31601298fe5c6f824fc82f6326b6ea5fb5bd5863b807fd63a9b694463237e44222efe61569ce34868e9395d323472e5b5d4106a6f03a9ad8da462651834b742af3d05431164afa37005fc14871f5f5ad8d1429b931abc05117bca0c15bf84acb5bb085d71a896df887ad7e5b59c45dc881cacddf2d6e9a648819f8be985c73c1185af248e8619a06aab9c1bfb8d632645128d09a87c6b0edc34b8f62e7d112f5d18fae7fd742053796588468c93fab33fe5fb833e7c83aba8e479dea8fd7b176652eecc5435a6506ca474dc14794dd355023e23bcf088cd7157639d1754423ba0768abea9102e7be6d87857a50671960f2c198b61d30acdc9c9a8ad2761083b4be678cb768a0c5e653b56be48884e6599cb4cf0edc751ff150046355e9ddd28964e298b3ab0cb26a8011b9109d3f939da4651a087aabd33038f435747883e458c248d597b3ed32923ad5fc473cb74a2134446dd124cbf020dd330781fb08abe91aca38668f63c1230ceb5afd714a9a0982a73cd74ce88020622909a4d60067992ad43a7925725c070849ff590ca97eb331ededadff64cec03247e61a6226abec335a23bac3e94fb106f2fa79d282310b8dd234576f1d1609674ba065c642239dc98e1c86d7f9676b114ae7a6d11e513d2c02dcc95649e40f768cc6600cac94a23d81b465ca5ec987d047202bcad7f1127be935472de54997257d0746c039b2b88bf4b19fcd7e980b7569228737ab56d5aaea8dd0cfba39f06336ee4c76f1fc3fc01d8d2103e5934b8b4f0a63b808acf41abbccb6dc6b269fd895f0bbd7477c7648a485ccd51d246e6e75243c32a12e9cf68f62f4ea54c9c5537c9d7411b6218b9146ed6c3d944e4fe8fc963e48e5585196732df07e8cd77ae991219d35558ccce978bc9695717f1eb4080c2cfbf45bb4ea218b2aa3b04b365d3e9b829470c46283861ef3e8e9abdf1ff380680067c438f05d036556943a677da7c446722d4d9cbc13a94ed0dd15ada6e596fa3a240aa568875d39e5725def751a097ff354df69982e5bb53af0409ec9483c7f464f00e5cb1e1c3c3c8b4c8cd36faa180cedcdd2a22a691c99331cefefb9e5d0866b7da10844289968083916430353a26ee921cc0497afc13b34c0f437b10825d154375c53a2495c2980cca8b1c5108fb7dbb2b46cb6a66db9b41984175e104122e0a86f37d16a930d81e9c0f8e957aa4cc665dcf47346db95a03b2d7abf511609080fce305055c9d14d85ae545c52800c2b6ebd443f36c90d30e7578c92a1ceccd8e331220371374268b1a802e97c74b0d05d2dfdcfc94f17d652760c5985d839eea208b6e16733cfe91a790227858b60ac40eef338b382d927c73752c8a535911c26d033f8eae63750fd77d6b09a6d0a91bd258992f082ac41896639746306297208114775dc4b29f9b072d6af529ea5f22b343ffec8e0157c3c537fcde98c9a3de95ba4d671c829af3c842b902fbc12aa09373f14cb0092df635a613aaa34b0b0264ddee161060b2f343770fe1114d275f674de081813baf318acefe1f0eb67a8fe3e9d91fdc453035b3f012ea4d08ad5a93453f9712811958d6f2a1b708f45a39c10c782540695cf90ae6468fbd817f537cfdbbd8169af649910ed5eb00a98b92f797900e6032423c0bffd7d4e7906394f3be5b7d0464466d7102d3715bf25df6d43bd60b4a393e1aba5f2a9cd978e5b6a335fa45d94c81e28f3759855ce60c90dd7522129221fa0a2a0c88455ea9b1dd91048f08f7067a66fa17fd2dd86516656975704cda442e777e694c4f70786fde48b975669c534c5c8d076671752f67a2b1b9143542f845fe3a9fb34145ba9e7caa56f5e2542953f5ce379b28a59d02d4f61be8c4eb072f0bee8646abaad898019be7c2a969c064bbe0d8fbd7d5753d36bb182fa44449ef77fec0c99f9fdd9258ba058f6be96f77ff33ae8e6ff3b4bf876a1788c92d9205abbd0628dcddf68676fa0a877438f4b56c3d85f7c9edd2c4f419b722519bafa7c1d4ad60dee77e64b6d8c301f7eafc74db7d81e0dce7169bea8871d404addd83e27d00974d162758bbc61c7044c5a53df0f165553bfc69f9e299a93a56e2ee25dcc8d5fc82851f9cf76421688ea3662f7082f437a4322b38e4f0b23ca27c1e9294e729afc578e56be9454571043e58a956d84301aad20e628f6ab7d0e9a29ae4f3ecaf7fbe2780f47592e4444c63d574b973672a079a567d0b80e9e4a345ca382b72394041f84eb8d52d904bf0efaf1fc56f86cd760d42f819151244875b085c6ce84acd25c23497f17abb05bda69c0db4affb9f616843bb2812086caced83634041ecb18a311d5452fa5c6438d25b893a51d1b1cb27e8f9eb53e92098d4eae8f9e44d66081614312c42f938a38c4ae03190d2cc6f94610e489fb2e3de3c1a3127cb8f6c2ee494702e30c708e686c63659d51fb8a04170611ac83e42b0ad229f47d637f412bd7cbd76e0558151f1d937b7ea9ec1fc2b10b1948ff52fc9c1e6a23b6f5ac81f3596c02ba24b2f4006c38c0497bb9a0ab7d6db3f251b51bc3e7c7264b502dfdb22b8c505c464fda936247d742a4635dca43310d1ebb4f7d76e5ddf9fc6fcad89b14c340f100ff2dcaac03132436f6718a70fb3224b9ddc26351e269e2ebcd53eee7c2041d38b79e0daa865e9734fbb435529d749aa8ef148b6eb9a4754623ce41c06c0657f07eac1d541783277dd15562734f24a6ee3214f3f026778c1977c5ca3bfea94d216938a5839a5c8d1df243b7d534aed44719e7ded7bc1dff259716c4c27b9c84d2f1dcc4db31a64d65aff5fe2a31cdb46b89036798b72f360fefb9597c8e65c244fb27ba5628edccccd00e1e48271d62d02a61c00989a0c644b7ca87a90c78a5790ec19c536c11f", 0x1000}, {&(0x7f00000000c0)="af36d080489c7750dc1e8aa609042f08b1321091a25c955f16627b6c63ca0b3edc441c9b5fafffbbdf985c00464926c8bafb412b75f3", 0x36}, {&(0x7f00000001c0)="3d9dce6293fda0dfb4ea3024c14cb16efb3c55195bf234dffd12f8f868bda21b7ede74fee13066a84d510c8af9a3751c7bbf9c5199f20ee3c3499e6a2defdb541e2ba40eae7f6ad73b9912404f63ab308c0e6dea6bb81f0ea4e0091fdbbad410ff5fc7d6fe8f0e8a9e9cd900a7179def93b4a58e139f04e7701545c5a94a2f441afa3071da91bbdaaf084fccd1badb0b50b1f35c5187e4317d36", 0x9a}, {&(0x7f0000000280)="abf0639103c6c3c511c9227e90b33a4545e887658d5c732932d616f616aeb3d066a63266e0ca2bde31bb100989d8663c3b6e2834f65d8daf", 0x38}], 0x4, 0x0, 0x0, 0x20000000}, {&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000380)="9e460c3901c2439bbf1dfb5902927bb43050acb9cf13ebe40a23f4cbadd5ba6a221d0581e0d83ebc5c1dd6767416d370f18db8328740ecd4f6fdebb5d9521d14b979e097f1432a01c00b88611257d1eff64dab40f933c698cfcfb316d41b8a1f25c749b2fdcb6b0a5c081b236fa8234f414056f0be41b15ad2d0c61d580254bdb8e0092f26fdf692d4cdfc07bfddad8b21f87897f89e18decfe35910475eef539a92e52fb44285d41775d7e06f6eced4bc7cb04dc9e36b3966dd0c656f8164fa59fb3065f87c875b426e6de269258551d8cf41c10b552e524e6e546a4104f225", 0xe0}, {&(0x7f0000001540)="ae28c0bc84509d0737c35125965a07bcdc4f5b34e8af8761be60824669a1dcd8611548447a2452661308f04ea99319eb6fc8dd8e119ba0027dcbd8c07e5b4d504554db783660b29e8492372d4b563ce33b42ff958ef20c53a7f6bdb24bc0cdab42d891451bdda830fc477cafb273d0db5b04540d353f9d50a5fc7106d0aad6e508403f7ced6089caf442490ede63c004e680605e", 0x94}, {&(0x7f0000001600)="bd0654946a6f00b03b9245d79da48eb2ced915506a125fd35ee8a425df26f87d1a4e144ad751003d7337334a380becb2a6a2afb28cde2eefb111d4", 0x3b}, {&(0x7f0000001640)="3eefb170", 0x4}], 0x4, &(0x7f0000001880)=[@rights={0x20, 0x1, 0x1, [r6, r3, r3]}, @rights={0x30, 0x1, 0x1, [r2, r3, r1, r0, r2, r3, r0]}, @cred={0x20, 0x1, 0x2, r5, r7, r8}, @cred={0x20, 0x1, 0x2, r4, r9, r10}, @rights={0x30, 0x1, 0x1, [r0, r3, r6, r2, r6, r1, r3]}, @cred={0x20, 0x1, 0x2, r5, r11, r12}, @rights={0x20, 0x1, 0x1, [r6, r3, r3]}], 0x100}, {&(0x7f0000001980)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001a00)="78263721578fb51b2b238711555578c9fdb331fc6841e5bfbe1cbb8681b2311c28045bfdb9e2c3d332ab94a17a68a82c3265248b406a4f", 0x37}, {&(0x7f0000001a40)="9f3181df2ca5e539cd9eac7d6c6afae207da9fc97abe39d1b1a577a1afdc3fce4d0d5a132119", 0x26}], 0x2, &(0x7f0000002340)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="000000001820000000000000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r19, @ANYRES32=r20, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r23, @ANYRES32=r24, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r25, @ANYRES32=r26, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r6], 0x130, 0x4000001}, {&(0x7f0000002480)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000002800)=[{&(0x7f0000002500)="1cc6b5047638407fe71b9735d2c69d1bd1bbe5a4e9e983d5c7c9432638c8e68a0fa5cddfcb5bf9c90a491b768c194434950931109c630035c8e32c6ce38a853f4b07812837de6a73a25c1f5f55c0122726480215e909dd0ce75cbd0dc16e413f056fe440d41f1c0f38a3ac624a3d53f6f6d636e1245f018adfb93e5494135b1d18d3cf50bc271c5b", 0x88}, {&(0x7f00000025c0)="0f0f1a39b106959d518129dd59ff44bab6950658a133d45e54c4e3d73b3339d0ea", 0x21}, {&(0x7f0000002600)="98e61d5d0977fd149db38f1ee12cf62efb3bfc7c90bbdf83b992723c554932b2173d6a25da907f62ed52aded0d6c0d7bdbac2b5acd4f8c59a2a975088c88d56505b4d2122eaa062200d93029f745107507b596a2136c3bfcbba92ce2dbe3c2525d1af7b679518b37181908a9bb9622aa03f09da24f99d77eea34235ec29f707997d0366d6c39142c34acbe1a7fe43fdc5b3f528887767bc022e9e9346850f7245e85bf219b994ccbf5dd08b4cf93a484c45161644eaaf76eb0e9732bb79c179f7d5cde8d02e5eb2ad64c1595786655844d9f7650b970f4cf77e6a0ef0c0cf359caeac950bc602b5c9e5320f18bdeef6f8aecd849129c7291c1", 0xf9}, {&(0x7f0000002700)="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", 0xff}], 0x4, &(0x7f0000002a40)=[@cred={0x20, 0x1, 0x2, r5, r27, r28}, @cred={0x20, 0x1, 0x2, r5, r29, r30}], 0x40, 0x20000000}], 0x4, 0x20040004) sendfile(r1, r6, 0x0, 0x10000000000443) socket$inet6(0xa, 0x4, 0x6) [ 2273.335136][ T2642] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2273.338219][ T2396] kobject: 'queues' (0000000011f0ea81): kobject_uevent_env [ 2273.350778][ T2396] kobject: 'queues' (0000000011f0ea81): kobject_uevent_env: filter function caused the event to drop! [ 2273.352973][ T2643] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2273.366427][ T2396] kobject: 'rx-0' (00000000ccbcc682): kobject_add_internal: parent: 'queues', set: 'queues' 17:02:46 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x162f}, 0x28) [ 2273.377041][ T2642] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.383686][ T2396] kobject: 'rx-0' (00000000ccbcc682): kobject_uevent_env [ 2273.391939][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2273.406557][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2273.407911][ T2396] kobject: 'rx-0' (00000000ccbcc682): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2273.424568][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2273.432742][ T2396] kobject: 'tx-0' (00000000527c10a6): kobject_add_internal: parent: 'queues', set: 'queues' [ 2273.436688][ T2643] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2273.447326][ T2396] kobject: 'tx-0' (00000000527c10a6): kobject_uevent_env [ 2273.457218][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2273.467270][ T2396] kobject: 'tx-0' (00000000527c10a6): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2273.476720][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2273.492802][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2273.497476][ T2396] mkiss: ax0: crc mode is auto. [ 2273.517488][ T2347] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2273.524913][ T2643] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2273.536133][ T2606] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2273.536633][ T2643] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2273.552151][ T2606] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.563313][ T2347] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.578808][ T2396] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2273.586577][ T2347] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2273.593650][ T2347] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.606537][ T2396] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.635131][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2273.647841][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2273.669157][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2273.676851][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2273.692652][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2273.705066][ T2380] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2273.709779][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2273.723182][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2273.723206][ T2380] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2273.731136][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2273.751759][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2273.759363][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2273.770440][ T2380] kobject: 'rx-0' (00000000ccbcc682): kobject_cleanup, parent 0000000011f0ea81 [ 2273.770557][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2273.783025][ T2380] kobject: 'rx-0' (00000000ccbcc682): auto cleanup 'remove' event [ 2273.787098][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2273.797356][ T2380] kobject: 'rx-0' (00000000ccbcc682): kobject_uevent_env [ 2273.806048][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2273.812892][ T2380] kobject: 'rx-0' (00000000ccbcc682): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2273.819368][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2273.833090][ T2380] kobject: 'rx-0' (00000000ccbcc682): auto cleanup kobject_del [ 2273.850965][ T2380] kobject: 'rx-0' (00000000ccbcc682): calling ktype release [ 2273.858682][ T2380] kobject: 'rx-0': free name [ 2273.863748][ T2380] kobject: 'tx-0' (00000000527c10a6): kobject_cleanup, parent 0000000011f0ea81 [ 2273.875763][ T2380] kobject: 'tx-0' (00000000527c10a6): auto cleanup 'remove' event [ 2273.896730][ T2380] kobject: 'tx-0' (00000000527c10a6): kobject_uevent_env [ 2273.903825][ T2380] kobject: 'tx-0' (00000000527c10a6): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2273.918190][ T2380] kobject: 'tx-0' (00000000527c10a6): auto cleanup kobject_del [ 2273.928386][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2273.931490][ T2380] kobject: 'tx-0' (00000000527c10a6): calling ktype release [ 2273.936302][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2273.944158][ T2380] kobject: 'tx-0': free name [ 2273.959948][ T2380] kobject: 'queues' (0000000011f0ea81): kobject_cleanup, parent (null) [ 2273.970281][ T2380] kobject: 'queues' (0000000011f0ea81): calling ktype release [ 2273.980256][ T2380] kobject: 'queues' (0000000011f0ea81): kset_release [ 2273.986999][ T2380] kobject: 'queues': free name [ 2273.992147][ T2380] kobject: 'ax0' (00000000a7b9b50b): kobject_uevent_env [ 2274.001949][ T2380] kobject: 'ax0' (00000000a7b9b50b): fill_kobj_path: path = '/devices/virtual/net/ax0' 17:02:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x940000, 0x0, 0x0, 0x0) 17:02:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) 17:02:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 17:02:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x2fc, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1630}, 0x28) 17:02:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000002640)={0xa, 0x0, 0x0, @dev}, &(0x7f0000002680)=0x1c, 0x80000) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000026c0)=0x6, 0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000000)={0x7e, @loopback, 0x4e22, 0x2, 'rr\x00', 0x2, 0x9, 0x37}, 0x2c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_dccp_buf(r2, 0x21, 0x80, &(0x7f0000000040)=""/18, &(0x7f0000000080)=0x12) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r2, r4, 0x0, 0x10000000000443) [ 2274.044450][ T2380] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.051648][ T2380] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.096511][ T3000] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.117869][ T3877] kobject: 'loop4' (00000000b27cf846): kobject_uevent_env [ 2274.128800][ T3007] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.130141][ T3000] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1631}, 0x28) [ 2274.148112][ T3877] kobject: 'loop4' (00000000b27cf846): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2274.154410][ T3007] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.172510][ T3006] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2274.172897][ T3013] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.190286][ T3006] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2274.212780][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2274.224906][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2274.247017][ T3013] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.265305][ T3006] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2274.275235][ T3006] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2274.291907][ T3007] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env 17:02:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000440)=@get={0x1, &(0x7f00000003c0)=""/95, 0x5}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2, &(0x7f0000000540)={'trans=xen,', {[{@access_client='access=client'}, {@cache_loose='cache=loose'}, {@access_user='access=user'}, {@msize={'msize', 0x3d, 0x4}}, {@msize={'msize', 0x3d, 0x3}}, {@aname={'aname', 0x3d, 'proc[,'}}, {@privport='privport'}, {@version_L='version=9p2000.L'}], [{@fsname={'fsname', 0x3d, 'wlan0vboxnet1proccgroupem1self'}}, {@euid_lt={'euid<', r1}}, {@smackfshat={'smackfshat', 0x3d, '/dev/vga_arbiter\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'eth1*'}}, {@context={'context', 0x3d, 'root'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x65, 0x77, 0x74, 0x65, 0x35, 0x3f, 0x30], 0x2d, [0x0, 0x30, 0x65, 0x37], 0x2d, [0x34, 0x61, 0x66, 0x66], 0x2d, [0x76, 0x7f, 0x0, 0x30], 0x2d, [0x0, 0x63, 0x7f, 0x37, 0x0, 0x32, 0x0, 0x73]}}}, {@fowner_gt={'fowner>', r2}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r3}}]}}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') syz_open_dev$dspn(&(0x7f00000006c0)='/dev/dsp#\x00', 0x7f, 0x400000) sendfile(r4, r6, 0x0, 0x10000000000443) [ 2274.302252][ T3007] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.308988][ T2998] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.324286][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2274.331542][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2274.342687][ T2998] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x300, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 17:02:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) 17:02:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1632}, 0x28) [ 2274.359591][ T3013] kobject: 'ax0' (000000001f03789d): kobject_add_internal: parent: 'net', set: 'devices' [ 2274.365000][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2274.385758][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2274.397943][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2274.410612][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2274.437871][ T3013] kobject: 'ax0' (000000001f03789d): kobject_uevent_env [ 2274.443292][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2274.449276][ T3411] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2274.460800][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2274.465623][ T2999] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.482018][ T3013] kobject: 'ax0' (000000001f03789d): fill_kobj_path: path = '/devices/virtual/net/ax0' [ 2274.484468][ T3411] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2274.505264][ T2999] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.511349][ T3468] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.523975][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2274.527175][ T3013] kobject: 'queues' (000000001c5dbea2): kobject_add_internal: parent: 'ax0', set: '' [ 2274.532713][ T3468] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:47 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1633}, 0x28) [ 2274.551407][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2274.556901][ T3013] kobject: 'queues' (000000001c5dbea2): kobject_uevent_env [ 2274.571535][ T2999] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.581357][ T2999] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.586637][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2274.597547][ T3013] kobject: 'queues' (000000001c5dbea2): kobject_uevent_env: filter function caused the event to drop! [ 2274.605507][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2274.627073][ T3013] kobject: 'rx-0' (000000008d9dcfde): kobject_add_internal: parent: 'queues', set: 'queues' [ 2274.640977][ T3877] kobject: 'loop3' (00000000c5a2b752): kobject_uevent_env [ 2274.647008][ T3013] kobject: 'rx-0' (000000008d9dcfde): kobject_uevent_env [ 2274.658121][ T3013] kobject: 'rx-0' (000000008d9dcfde): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2274.659830][ T3877] kobject: 'loop3' (00000000c5a2b752): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2274.669643][ T3013] kobject: 'tx-0' (0000000047feb579): kobject_add_internal: parent: 'queues', set: 'queues' [ 2274.692918][ T3013] kobject: 'tx-0' (0000000047feb579): kobject_uevent_env [ 2274.700678][ T3013] kobject: 'tx-0' (0000000047feb579): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2274.715011][ T3411] XFS (loop1): Invalid superblock magic number [ 2274.715263][ T3013] mkiss: ax0: crc mode is auto. [ 2274.741873][ T3466] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.750545][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2274.761152][ T3466] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.761525][ T3013] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.778921][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2274.784702][ T3013] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.790323][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2274.807177][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2274.818023][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2274.825229][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2274.845781][ T3009] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2274.852994][ T3009] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2274.876141][ T3009] kobject: 'rx-0' (000000008d9dcfde): kobject_cleanup, parent 000000001c5dbea2 [ 2274.887535][ T3009] kobject: 'rx-0' (000000008d9dcfde): auto cleanup 'remove' event [ 2274.896677][ T3009] kobject: 'rx-0' (000000008d9dcfde): kobject_uevent_env [ 2274.903886][ T3009] kobject: 'rx-0' (000000008d9dcfde): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/rx-0' [ 2274.917830][ T3009] kobject: 'rx-0' (000000008d9dcfde): auto cleanup kobject_del [ 2274.926608][ T3009] kobject: 'rx-0' (000000008d9dcfde): calling ktype release [ 2274.934075][ T3009] kobject: 'rx-0': free name [ 2274.941849][ T3009] kobject: 'tx-0' (0000000047feb579): kobject_cleanup, parent 000000001c5dbea2 [ 2274.951772][ T3009] kobject: 'tx-0' (0000000047feb579): auto cleanup 'remove' event [ 2274.963139][ T3009] kobject: 'tx-0' (0000000047feb579): kobject_uevent_env [ 2274.970671][ T3009] kobject: 'tx-0' (0000000047feb579): fill_kobj_path: path = '/devices/virtual/net/ax0/queues/tx-0' [ 2274.984861][ T3009] kobject: 'tx-0' (0000000047feb579): auto cleanup kobject_del [ 2274.992637][ T3009] kobject: 'tx-0' (0000000047feb579): calling ktype release [ 2275.003146][ T3009] kobject: 'tx-0': free name [ 2275.008555][ T3009] kobject: 'queues' (000000001c5dbea2): kobject_cleanup, parent (null) [ 2275.020360][ T3009] kobject: 'queues' (000000001c5dbea2): calling ktype release [ 2275.028862][ T3009] kobject: 'queues' (000000001c5dbea2): kset_release [ 2275.038263][ T3009] kobject: 'queues': free name [ 2275.043538][ T3009] kobject: 'ax0' (000000001f03789d): kobject_uevent_env [ 2275.051437][ T3009] kobject: 'ax0' (000000001f03789d): fill_kobj_path: path = '/devices/virtual/net/ax0' 17:02:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x5) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0xa07000, 0x0, 0x0, 0x0) 17:02:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x20000000000000, 0x0, 0x0, 0x0) 17:02:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) accept4$ax25(r0, &(0x7f0000000000)={{0x3, @null}, [@default, @remote, @rose, @null, @rose, @null]}, &(0x7f0000000080)=0x48, 0x80800) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') ioctl$VIDIOC_STREAMOFF(r3, 0x40045613, &(0x7f00000000c0)=0x5) sendfile(r1, r3, 0x0, 0x10000000000443) 17:02:48 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1634}, 0x28) 17:02:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) [ 2275.104378][ T3009] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.111971][ T3009] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2275.124510][ T3411] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2275.132192][ T3411] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2275.188006][ T3747] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.190617][ T3750] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.195975][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2275.210297][ T3747] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2275.220349][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:02:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x310, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 2275.243750][ T3877] kobject: 'loop4' (00000000b27cf846): kobject_uevent_env [ 2275.246627][ T3750] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2275.255355][ T3759] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.268749][ T3877] kobject: 'loop4' (00000000b27cf846): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2275.277620][ T3759] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:02:48 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1635}, 0x28) [ 2275.318634][ T3750] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.326798][ T3877] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2275.337084][ T3877] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:02:48 executing program 5: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x4800000c0045009, &(0x7f0000000080)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000080), 0x1c) pipe(&(0x7f0000000640)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000480)='tls\x00', 0x101) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000100), 0x28) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') sendfile(r4, r6, 0x0, 0x10000000000443) [ 2275.366660][ T3905] kobject: 'loop1' (000000002a31a1a1): kobject_uevent_env [ 2275.369330][ T3750] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2275.376832][ T3759] kobject: 'ax0' (00000000888c66e6): kobject_add_internal: parent: 'net', set: 'devices' [ 2275.398063][ T3746] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.405297][ T3905] kobject: 'loop1' (000000002a31a1a1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2275.415937][ T3746] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2275.433902][ T3877] kobject: 'loop0' (00000000b0f713c2): kobject_uevent_env [ 2275.442506][ T3759] kobject: 'ax0' (00000000888c66e6): kobject_uevent_env [ 2275.451594][ T3759] kobject: 'ax0' (00000000888c66e6): fill_kobj_path: path = '/devices/virtual/net/ax0' 17:02:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x4000000000000f) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000d000/0x18000)=nil, 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) [ 2275.467874][ T3759] kobject: 'queues' (000000003e3e8aa9): kobject_add_internal: parent: 'ax0', set: '' [ 2275.471479][ T3749] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.485052][ T3877] kobject: 'loop0' (00000000b0f713c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2275.485554][ T3877] kobject: 'loop5' (000000002de93dd4): kobject_uevent_env [ 2275.503614][ T3759] kobject: 'queues' (000000003e3e8aa9): kobject_uevent_env 17:02:48 executing program 0: socket$packet(0x11, 0x0, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='\x01\ad\x98', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="6a48373dea8c0000000020000000", 0x0, 0x1636}, 0x28) [ 2275.520991][ T4103] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.528879][ T3749] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2275.530064][ T3877] kobject: 'loop5' (000000002de93dd4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2275.541819][ T4103] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2275.553734][ T3759] kobject: 'queues' (000000003e3e8aa9): kobject_uevent_env: filter function caused the event to drop! [ 2275.572353][ T3749] kobject: 'kvm' (000000003cf8fe47): kobject_uevent_env [ 2275.582176][ T3749] kobject: 'kvm' (000000003cf8fe47): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2275.586947][ T3877] kobject: 'loop2' (000000009c70df3c): kobject_uevent_env [ 2275.600347][ T3759] kobject: 'rx-0' (00000000eeaa4ed4): kobject_add_internal: parent: 'queues', set: 'queues' [ 2275.611635][ T3877] kobject: 'loop2' (000000009c70df3c): fill_kobj_path: path = '/devices/virtual/block/loop2' 17:02:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0