c77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x3, 0xdaa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000540], 0x0, &(0x7f0000000040), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x3, 0x30, 0x8847, 'bpq0\x00', 'ip6tnl0\x00', 'rose0\x00', 'team_slave_0\x00', @remote, [0xff, 0x0, 0xff, 0xff, 0x1fe, 0xff], @random="b9f802c095a6", [0x0, 0x80, 0xff, 0x0, 0x0, 0x101], 0xce, 0x176, 0x2a6, [@pkttype={'pkttype\x00', 0x8, {{0x2}}}, @pkttype={'pkttype\x00', 0x8, {{0x2}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0xefd, 0x200, 0x1, 0x0, "7302376c71af91c5eecd6866495ef01cc8ec12cf6948174b5d1c24d6a61d13f2f7ddd56b9c478ddd734db15801213de904767ceaebcbd50f60ecb981a1515d3d"}}}, @common=@AUDIT={'AUDIT\x00', 0x8}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0xc251, 'system_u:object_r:ssh_exec_t:s0\x00'}}}}, {0x3, 0x40, 0x88f5, 'team_slave_0\x00', 'gre0\x00', 'ip_vti0\x00', 'nr0\x00', @empty, [0x0, 0x0, 0x0, 0xff], @link_local, [0x0, 0x4b4c44c8cb586263, 0xff, 0x1fe, 0x0, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x1f}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x3, 0x40, 0x0, 'veth1_to_hsr\x00', 'ifb0\x00', 'bcsh0\x00', 'bond_slave_0\x00', @random="c099606b49d5", [0x0, 0x0, 0x6e991498e0a939a5, 0xff, 0xff, 0xff], @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff], 0x92e, 0x92e, 0x976, [@state={'state\x00', 0x8, {{0x7}}}, @among={'among\x00', 0x868, {{@offset, @offset, 0x2, {[0x8000, 0x9, 0x101, 0x80, 0x4, 0x40, 0xffff8000, 0x3, 0x4, 0xe95, 0x0, 0x8, 0x6, 0x3, 0x7, 0x0, 0x800, 0x0, 0x8, 0xb7d6, 0x4, 0x9, 0x100, 0x6, 0x7ff, 0x2, 0x400, 0xc4, 0x4e, 0x101, 0x3, 0x0, 0x8001, 0xffff, 0x4000, 0x8, 0x40, 0x5, 0x1000000, 0x2, 0x24000, 0x5, 0x2, 0x2, 0x400, 0x143, 0x7ff, 0xffff, 0x134d, 0x1, 0x6bc, 0x5, 0x4, 0x5, 0x1, 0xe4, 0x3, 0x3, 0xb06, 0x3, 0x1, 0x8000, 0x400, 0x3, 0x8000, 0x6, 0x20, 0x94, 0x2, 0x1, 0x3, 0xffff4981, 0x1, 0x3, 0x1ed8, 0x1ff, 0x9, 0x0, 0x9, 0x3, 0x4, 0x9, 0x7f, 0x10001, 0x4, 0xfffffff7, 0x200, 0x6, 0x9, 0x8, 0x1, 0x8000, 0xfff, 0x876, 0x2, 0x0, 0x5, 0x62eb747a, 0x400, 0xeb2e, 0x3, 0x2c6e5ff6, 0x7, 0x80000001, 0x800, 0x400, 0x4, 0x20, 0x0, 0x2, 0xfffff343, 0x5, 0x5, 0x800, 0x8f2, 0x0, 0x5, 0xa3e, 0x0, 0x5, 0x1, 0x100, 0xca6c, 0x18, 0xffffffff, 0x7, 0xa6ca, 0xfffffffc, 0x400, 0x400, 0x10000, 0x10000, 0x8, 0x0, 0x4, 0x3ff, 0xfff, 0x5, 0x2, 0x8, 0x3, 0x3, 0x1f, 0x7ff, 0x0, 0xe1, 0x5, 0x86a, 0xa4, 0x93a, 0x101, 0x2, 0x3, 0x8001, 0xfffffe00, 0x2, 0x8, 0x1, 0x5, 0x74d, 0x3, 0x8, 0x1, 0x1000, 0x5, 0x2, 0xffffff4a, 0x8000, 0x7, 0x4, 0x7, 0x9, 0xffffffff, 0xffffffff, 0x200, 0xc39, 0xc1, 0x8, 0xc80, 0x4, 0xb0, 0xcb9, 0xfffffc01, 0x6, 0x3, 0x8, 0x101, 0x49, 0x80, 0x7, 0xffff, 0x400, 0x1, 0x3f, 0x10000, 0xc1, 0x7, 0x0, 0x5, 0x100, 0xdc, 0x6, 0xf4, 0x3, 0x20, 0x3, 0x3, 0x7, 0x8, 0x2, 0x100, 0x7, 0x4, 0x5, 0x0, 0x8, 0x4, 0x2, 0x0, 0x1f, 0x1f, 0x2, 0x7f, 0xff, 0x0, 0x7, 0x101, 0x7fffffff, 0x9, 0x20, 0x9, 0x0, 0xfffffffa, 0x7ea8, 0x8001, 0xf81, 0x2da6, 0x84, 0x0, 0x7, 0x401, 0xffffffdc, 0x7, 0x2, 0x200000, 0x8, 0x7, 0x0, 0x7d, 0xffffffff, 0x200, 0x80, 0x1, 0x5a90, 0x100, 0x2, 0x8], 0x4, [{[0x100, 0x400], @multicast2}, {[0x0, 0xff], @loopback}, {[0x2000, 0x8000], @empty}, {[0x20, 0x35], @broadcast}]}, {[0xffffffff, 0x1, 0x8d0, 0xffffffff, 0x4, 0x0, 0x2, 0x401, 0x4, 0x2, 0x0, 0x3, 0x3, 0x1, 0x4, 0x8, 0x2800, 0xb2d, 0xff, 0x5, 0x3, 0x4, 0xffff, 0x0, 0x3ff, 0x3ff, 0x5, 0x8, 0x3f, 0x400, 0x7, 0x20, 0x5, 0x8, 0x7fffffff, 0xb3, 0x1, 0x7, 0x66, 0x4, 0xb49, 0x3, 0xa4ca, 0x101, 0xed, 0x1, 0xff, 0x3, 0x0, 0x3, 0x2, 0x0, 0x7d155dda, 0xfffffffe, 0x4b7, 0x2, 0x3, 0x6, 0x1d40e000, 0x2, 0xfffeffff, 0x1, 0x7fc000, 0x4fb, 0x4, 0xf6af, 0x2, 0x12e2, 0x5, 0x101, 0x0, 0x7ff, 0x7, 0x9, 0x0, 0x0, 0x0, 0x1, 0x51, 0x1, 0x6, 0x9, 0x6, 0xa2, 0x16, 0x8001, 0x2, 0x2, 0x7, 0x1, 0x1f, 0x600, 0x8, 0x6, 0x3, 0x1, 0x2, 0x3, 0x7a80a054, 0x400, 0xe89f, 0x7f, 0x2, 0x4, 0x9, 0x101, 0x6, 0x7, 0x7cc1434f, 0x7fff, 0x6, 0x1, 0x8, 0x6, 0x7ff, 0x6, 0x101, 0x8, 0x800, 0x101, 0x4, 0x7, 0xff, 0x8, 0x3, 0x7, 0x99, 0x0, 0x1ff, 0xfffff001, 0x3ff, 0x2, 0x5, 0x7, 0x6, 0x9, 0x7ff, 0x2c, 0x100, 0x80000000, 0xb5, 0x5, 0xb7c, 0x1ff, 0x5, 0x0, 0xffffffff, 0x1, 0x4, 0x2, 0xaa, 0x5, 0xffffffe0, 0x0, 0x3, 0x4, 0xfffff800, 0xe736, 0x1, 0x80, 0x3, 0x0, 0xffffffff, 0x3, 0x0, 0x101, 0x101, 0x3, 0xffffe6a4, 0x4, 0x8, 0x4, 0x80000000, 0xec54, 0xd9e, 0x4, 0x6, 0x3f, 0x9e9, 0x7fff, 0x2, 0x7, 0x7f, 0x77c25edc, 0x10000, 0x7, 0x9, 0x1000, 0x46c, 0x1, 0x7, 0x0, 0x6, 0x10000, 0x5, 0xffff5d7f, 0x2, 0x800, 0x10000, 0x2, 0x0, 0x0, 0x1, 0x6, 0x2, 0x9, 0x9, 0x0, 0x2, 0x2, 0x5, 0x8001, 0x5cbb, 0x1000, 0xdc, 0x9, 0x0, 0x6, 0x3, 0x7ff, 0x0, 0x1, 0x3ff, 0x7f, 0x6, 0x5, 0x102, 0x1ff, 0x1, 0x5, 0xcf7, 0x1000, 0x8, 0x2, 0x3, 0x6, 0x4, 0x7, 0x9, 0xc30, 0x9, 0x2, 0x1, 0xcf, 0xc0000000, 0xffff, 0xfbe, 0x800, 0x101, 0xffffffe0, 0x6, 0x2, 0x0, 0x4, 0x6, 0x6, 0x5], 0x2, [{[0x5, 0x4c], @loopback}, {[0x4, 0x10001], @remote}]}}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x7f, 0x73, 0x5}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0xe22) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:51:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000080)=""/157, 0x9d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x4e5ccf5, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000040)=""/20, 0x14}, {0x0}, {0x0}], 0x3}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/157, 0x9d}], 0x1}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 03:51:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1da}, 0x28) 03:51:18 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x1b\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1531.010911][ T4271] kvm: pic: non byte read [ 1531.030704][ T4271] kvm: pic: non byte write [ 1531.041001][ T4271] kvm: pic: non byte read [ 1531.050771][ T4271] kvm: pic: non byte write 03:51:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1db}, 0x28) 03:51:18 executing program 4: [ 1531.061728][ T4271] kvm: pic: non byte read [ 1531.075005][ T4271] kvm: pic: non byte write [ 1531.087306][ T4271] kvm: pic: non byte read [ 1531.094701][ T4271] kvm: pic: non byte write [ 1531.100684][ T4271] kvm: pic: non byte read [ 1531.105351][ T4271] kvm: pic: non byte write [ 1531.111900][ T4271] kvm: pic: non byte read [ 1531.117103][ T4271] kvm: pic: non byte write [ 1531.135200][ T4271] kvm: pic: non byte read [ 1531.150150][ T4271] kvm: pic: non byte write 03:51:18 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3/\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1531.161068][ T4271] kvm: pic: non byte read [ 1531.168303][ T4271] kvm: pic: non byte write [ 1531.177985][ T4271] kvm: pic: non byte read [ 1531.190629][ T4271] kvm: pic: non byte write [ 1531.198141][ T4271] kvm: pic: non byte read 03:51:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1dc}, 0x28) [ 1531.211866][ T4271] kvm: pic: non byte write [ 1534.470034][ C1] net_ratelimit: 18 callbacks suppressed [ 1534.470042][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1534.481497][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1534.487279][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1534.493206][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1534.870014][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1534.870036][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1534.875797][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1535.429991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1535.435802][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1535.830005][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:51:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1dd}, 0x28) 03:51:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockname$packet(r7, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000020c0)=0xfffffdb0) 03:51:25 executing program 4: 03:51:25 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc30\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb, 0xfffffffffffffffd, 0x0, 0x401], 0x100000, 0x244401}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$setlease(r4, 0x400, 0x2) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r5, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r6, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x70cd}]}, 0x24}, 0x1, 0x0, 0x0, 0x240048c0}, 0x0) 03:51:25 executing program 1: 03:51:25 executing program 1: 03:51:25 executing program 4: [ 1538.266260][ T4311] picdev_read: 26 callbacks suppressed [ 1538.266265][ T4311] kvm: pic: non byte read [ 1538.280309][ T4311] picdev_write: 26 callbacks suppressed [ 1538.280316][ T4311] kvm: pic: non byte write 03:51:25 executing program 1: 03:51:25 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2400500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') lsetxattr$security_capability(&(0x7f0000000100)='./file2\x00', 0x0, 0x0, 0x235, 0x3) 03:51:25 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3O\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1de}, 0x28) 03:51:25 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000080)={0x9}, 0x14) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="8589ffd3c6d51eff96b71a0d1963da236381bf9d0200957a44cd3d497bf3c85b064a1f901becf56507cf4bc208e800f7b1ec950388aca58d31"]) r3 = syz_open_dev$vcsu(&(0x7f0000000500)='/dev/vcsu#\x00', 0x2000000000000000, 0x0) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e20, @multicast1}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}, 0x0, 0x0, 0x0, 0x0, 0x609, &(0x7f0000000580)='veth1\x00', 0xfffffffffffffff8, 0x7fffffff, 0x4}) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="92e3562bdf11ddc63f7b70aed00dd631", 0x2, 0x0, 0x7, 0x0, 0x0, 0x8}) [ 1539.590003][ C0] net_ratelimit: 21 callbacks suppressed [ 1539.595677][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1539.601477][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1539.990013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1539.995811][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1540.710025][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1540.715832][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1540.721596][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1540.727366][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1541.109999][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1541.110031][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1544.880001][ C1] net_ratelimit: 16 callbacks suppressed [ 1544.880008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1544.891419][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1544.897241][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1544.902987][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1545.269981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1545.275744][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1545.279977][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1545.287171][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:51:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockname$packet(r7, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000020c0)=0xfffffdb0) 03:51:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x8000, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @ioapic={0x3000, 0x1000, 0x80000000, 0x10001, 0x0, [{0x0, 0x51, 0x8, [], 0xff}, {0x10, 0x3, 0x0, [], 0x9}, {0x2, 0x5, 0x20, [], 0x5}, {0x0, 0x7d, 0x1, [], 0x8b}, {0xea, 0x4, 0x2, [], 0x1f}, {0xec, 0x3, 0x2, [], 0x8}, {0x8, 0x7, 0x5, [], 0x4}, {0x6, 0x80, 0x81, [], 0x33}, {0x10, 0x0, 0x6, [], 0x1f}, {0xfa, 0xcb, 0x4, [], 0x40}, {0xff, 0x8, 0x7f, [], 0x40}, {0x20, 0x11, 0x4, [], 0x2a}, {0x4, 0x0, 0x1}, {0x3, 0x3, 0x4, [], 0x8}, {0xb2, 0x9, 0x4, [], 0x60}, {0x3, 0x1, 0x0, [], 0x1}, {0x6, 0xe1, 0x9, [], 0x3f}, {0x80, 0x0, 0x1f, [], 0x1}, {0x9, 0x0, 0x5, [], 0xa2}, {0x8, 0x6, 0x5, [], 0x5}, {0x1, 0x0, 0x0, [], 0x2}, {0x1, 0x7f, 0x4, [], 0x3}, {0x2, 0xb5, 0x1}, {0x1f, 0x7f, 0x81}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb, 0xfffffffffffffffc], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:51:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1df}, 0x28) 03:51:32 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:51:32 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3P\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:32 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2400500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') lsetxattr$security_capability(&(0x7f0000000100)='./file2\x00', 0x0, 0x0, 0x235, 0x3) 03:51:32 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:51:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e0}, 0x28) 03:51:32 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x9b\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:32 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:51:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000280)="3742226841a5bd712062bb6838b95953de7cfc7183d76dd3215720aeb8459cbf85b06ff363a025e06991380fee6899852b07c68de1ad68fe5ab2bd3da912a2e44385eb770b74a978b0fa7f89c319f00e3e79b1d147bcb04027ffcecba8df38fc95d035868a39a550ce1f33b56f094156", &(0x7f0000000300)=""/250, 0x4}, 0x20) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:51:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e1}, 0x28) [ 1545.829965][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1545.835782][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1545.866369][ T4377] kvm: pic: non byte read [ 1545.884766][ T4377] kvm: pic: non byte write [ 1545.900006][ T4377] kvm: pic: non byte read [ 1545.906626][ T4377] kvm: pic: non byte write [ 1549.990023][ C0] net_ratelimit: 21 callbacks suppressed [ 1549.995711][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1550.001469][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1550.390049][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1550.395838][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1551.110040][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1551.115839][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1551.121604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1551.127346][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1551.510014][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1551.510020][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:51:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:51:42 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\x9b\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e2}, 0x28) 03:51:42 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x7, 0x16, 0xc6, &(0x7f0000000540)}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f00000001c0)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000280)=0x400) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 03:51:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:51:42 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2400500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') lsetxattr$security_capability(&(0x7f0000000100)='./file2\x00', 0x0, 0x0, 0x235, 0x3) 03:51:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e3}, 0x28) 03:51:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:51:42 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\aV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e4}, 0x28) [ 1555.270050][ C1] net_ratelimit: 18 callbacks suppressed [ 1555.270059][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1555.281539][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1555.281581][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:51:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x1) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f0000000300)=0xb56) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f0000000600)={0x10012000, &(0x7f0000000280), &(0x7f0000000340)=0x0, &(0x7f0000000380), 0x22, 0x0, &(0x7f00000003c0)=""/103, 0x67, &(0x7f0000000540)=""/161, &(0x7f0000000440)=[0x0], 0x1}, 0x50) r4 = gettid() tkill(r4, 0x16) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x501440, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r7, 0x4068aea3, &(0x7f00000001c0)={0x79}) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) kcmp(r3, r4, 0x0, r5, r8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r10, 0x4068aea3, &(0x7f00000001c0)={0x79}) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) ioctl$KVM_RUN(r11, 0xae80, 0x0) sync_file_range(r11, 0xfff, 0x0, 0x1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r12 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x208000, 0x0) ioctl$KVM_SET_REGS(r12, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r13, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r12, 0xae80, 0x0) [ 1555.281609][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:51:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e5}, 0x28) 03:51:42 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e6}, 0x28) 03:51:42 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\tV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e7}, 0x28) [ 1555.669969][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1555.669986][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1555.675725][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1555.687224][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1556.230000][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1556.235781][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1560.390018][ C0] net_ratelimit: 22 callbacks suppressed [ 1560.395810][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1560.401561][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1560.790006][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1560.795833][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1561.510000][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1561.515778][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1561.521545][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1561.527270][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1561.910061][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1561.915859][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:51:51 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\nV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:51:51 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2400500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') lsetxattr$security_capability(&(0x7f0000000100)='./file2\x00', 0x0, 0x0, 0x235, 0x3) 03:51:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e8}, 0x28) 03:51:51 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:51:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1564.383551][ T4449] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1564.411473][ T4449] CPU: 1 PID: 4449 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1564.419751][ T4449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1564.429794][ T4449] Call Trace: [ 1564.433083][ T4449] dump_stack+0x11d/0x181 [ 1564.437408][ T4449] dump_header+0xaa/0x449 [ 1564.441730][ T4449] oom_kill_process.cold+0x10/0x15 [ 1564.446904][ T4449] out_of_memory+0x231/0xa00 [ 1564.451566][ T4449] mem_cgroup_out_of_memory+0x128/0x150 [ 1564.457164][ T4449] try_charge+0xb5c/0xbe0 [ 1564.461485][ T4449] ? __rcu_read_unlock+0x10/0x3c0 [ 1564.466605][ T4449] mem_cgroup_try_charge+0xd2/0x260 [ 1564.471875][ T4449] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1564.477499][ T4449] wp_page_copy+0x322/0x1120 [ 1564.482119][ T4449] ? __read_once_size+0x41/0xe0 [ 1564.486963][ T4449] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1564.493015][ T4449] do_wp_page+0x192/0x11f0 [ 1564.497428][ T4449] ? record_times+0x16/0x90 [ 1564.502006][ T4449] __handle_mm_fault+0x1ab1/0x2c70 [ 1564.507119][ T4449] handle_mm_fault+0x21b/0x530 [ 1564.511878][ T4449] __do_page_fault+0x456/0x8d0 [ 1564.516679][ T4449] do_page_fault+0x38/0x194 [ 1564.521173][ T4449] page_fault+0x34/0x40 [ 1564.525451][ T4449] RIP: 0033:0x458d3a [ 1564.529342][ T4449] Code: 00 00 0f 31 48 c1 e2 20 89 c0 48 09 c2 64 48 89 14 25 20 06 00 00 b8 70 50 41 00 48 89 15 5e fc 61 00 48 85 c0 74 08 4c 89 cf 31 c3 fb ff 45 85 f6 0f 85 58 01 00 00 48 85 db 48 c7 05 3a 22 [ 1564.548941][ T4449] RSP: 002b:00007ffc28b1a1d0 EFLAGS: 00010202 [ 1564.555093][ T4449] RAX: 0000000000415070 RBX: 00007ffc28b1a1d0 RCX: 0000000000458cca [ 1564.563051][ T4449] RDX: 00000347b4162013 RSI: 0000000000000000 RDI: 0000000001a73940 [ 1564.571013][ T4449] RBP: 00007ffc28b1a210 R08: 0000000000000001 R09: 0000000001a73940 [ 1564.578975][ T4449] R10: 0000000001a73c10 R11: 0000000000000246 R12: 0000000000000001 [ 1564.586978][ T4449] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc28b1a260 [ 1564.604991][ T4449] memory: usage 307200kB, limit 307200kB, failcnt 1987 [ 1564.612105][ T4449] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1564.619060][ T4449] Memory cgroup stats for /syz4: [ 1564.619332][ T4449] anon 283648000 [ 1564.619332][ T4449] file 40960 [ 1564.619332][ T4449] kernel_stack 4239360 [ 1564.619332][ T4449] slab 5373952 [ 1564.619332][ T4449] sock 0 [ 1564.619332][ T4449] shmem 126976 [ 1564.619332][ T4449] file_mapped 0 [ 1564.619332][ T4449] file_dirty 0 [ 1564.619332][ T4449] file_writeback 0 [ 1564.619332][ T4449] anon_thp 264241152 [ 1564.619332][ T4449] inactive_anon 135168 [ 1564.619332][ T4449] active_anon 283672576 [ 1564.619332][ T4449] inactive_file 0 [ 1564.619332][ T4449] active_file 32768 [ 1564.619332][ T4449] unevictable 0 [ 1564.619332][ T4449] slab_reclaimable 675840 [ 1564.619332][ T4449] slab_unreclaimable 4698112 [ 1564.619332][ T4449] pgfault 99693 [ 1564.619332][ T4449] pgmajfault 0 [ 1564.619332][ T4449] workingset_refault 0 [ 1564.619332][ T4449] workingset_activate 0 [ 1564.619332][ T4449] workingset_nodereclaim 0 [ 1564.619332][ T4449] pgrefill 799 [ 1564.619332][ T4449] pgscan 4580 [ 1564.619332][ T4449] pgsteal 3219 [ 1564.713122][ T4449] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=12065,uid=0 [ 1564.729010][ T4449] Memory cgroup out of memory: Killed process 12065 (syz-executor.4) total-vm:72712kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 03:51:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1e9}, 0x28) [ 1564.786331][ T4457] kvm: pic: non byte read [ 1564.800302][ T4457] kvm: pic: non byte write [ 1564.817365][ T4457] kvm: pic: non byte read [ 1564.823415][ T7652] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1564.828639][ T4457] kvm: pic: non byte write [ 1564.857060][ T7652] CPU: 0 PID: 7652 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1564.865328][ T7652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1564.875385][ T7652] Call Trace: [ 1564.878692][ T7652] dump_stack+0x11d/0x181 [ 1564.883047][ T7652] dump_header+0xaa/0x449 [ 1564.887369][ T7652] oom_kill_process.cold+0x10/0x15 [ 1564.892472][ T7652] out_of_memory+0x231/0xa00 [ 1564.897064][ T7652] mem_cgroup_out_of_memory+0x128/0x150 [ 1564.902616][ T7652] try_charge+0x7f5/0xbe0 [ 1564.906956][ T7652] ? __rcu_read_unlock+0x10/0x3c0 [ 1564.911974][ T7652] mem_cgroup_try_charge+0xd2/0x260 [ 1564.917233][ T7652] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1564.922868][ T7652] wp_page_copy+0x322/0x1120 [ 1564.927473][ T7652] ? __read_once_size+0x41/0xe0 [ 1564.932313][ T7652] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1564.938195][ T7652] do_wp_page+0x192/0x11f0 [ 1564.942630][ T7652] ? __udelay+0x10/0x20 [ 1564.946782][ T7652] __handle_mm_fault+0x1ab1/0x2c70 [ 1564.951939][ T7652] handle_mm_fault+0x21b/0x530 [ 1564.956695][ T7652] __do_page_fault+0x456/0x8d0 [ 1564.961449][ T7652] do_page_fault+0x38/0x194 [ 1564.966073][ T7652] page_fault+0x34/0x40 [ 1564.970329][ T7652] RIP: 0033:0x458e2a [ 1564.974337][ T7652] Code: 48 85 db 74 b6 41 bc ca 00 00 00 eb 0c 0f 1f 00 48 8b 5b 08 48 85 db 74 a2 48 8b 3b 48 8b 47 10 48 85 c0 74 05 ff d0 48 8b 3b ff 4f 28 0f 94 c0 84 c0 74 db 8b 47 2c 85 c0 74 d4 45 31 d2 ba [ 1564.994102][ T7652] RSP: 002b:00007ffc28b1a1d0 EFLAGS: 00010246 03:51:52 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\fV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1565.000154][ T7652] RAX: 0000000000000000 RBX: 00007ffc28b1a1d0 RCX: 0000000000458cca [ 1565.008111][ T7652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000a771a8 [ 1565.016106][ T7652] RBP: 00007ffc28b1a210 R08: 0000000000000001 R09: 0000000001a73940 [ 1565.024064][ T7652] R10: 0000000001a73c10 R11: 0000000000000246 R12: 00000000000000ca [ 1565.032088][ T7652] R13: 0000000000000aed R14: 0000000000000000 R15: 00007ffc28b1a260 03:51:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000280)={0x3, 0x41, "e0b3f363f7ea965421c3c2107346a61d53c2b0edcd132fc74470accdbf5d4b118f8a2fb900f2a1ff96a5b5087dd909ac550859248087d80212d6b0f2d8d49fb609"}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:51:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1ea}, 0x28) [ 1565.086450][ T7652] memory: usage 305356kB, limit 307200kB, failcnt 1988 [ 1565.110066][ T7652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1565.122555][ T7652] Memory cgroup stats for /syz4: [ 1565.122727][ T7652] anon 281706496 [ 1565.122727][ T7652] file 581632 [ 1565.122727][ T7652] kernel_stack 4239360 [ 1565.122727][ T7652] slab 5373952 [ 1565.122727][ T7652] sock 0 [ 1565.122727][ T7652] shmem 126976 [ 1565.122727][ T7652] file_mapped 0 [ 1565.122727][ T7652] file_dirty 0 [ 1565.122727][ T7652] file_writeback 0 [ 1565.122727][ T7652] anon_thp 262144000 [ 1565.122727][ T7652] inactive_anon 135168 [ 1565.122727][ T7652] active_anon 281706496 [ 1565.122727][ T7652] inactive_file 462848 [ 1565.122727][ T7652] active_file 32768 [ 1565.122727][ T7652] unevictable 0 [ 1565.122727][ T7652] slab_reclaimable 675840 [ 1565.122727][ T7652] slab_unreclaimable 4698112 [ 1565.122727][ T7652] pgfault 99891 [ 1565.122727][ T7652] pgmajfault 0 [ 1565.122727][ T7652] workingset_refault 0 [ 1565.122727][ T7652] workingset_activate 0 [ 1565.122727][ T7652] workingset_nodereclaim 0 [ 1565.122727][ T7652] pgrefill 799 [ 1565.122727][ T7652] pgscan 4580 [ 1565.122727][ T7652] pgsteal 3219 03:51:52 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 1565.246211][ T7652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=12035,uid=0 [ 1565.268954][ T7652] Memory cgroup out of memory: Killed process 12035 (syz-executor.4) total-vm:72712kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1565.295549][ T1070] oom_reaper: reaped process 12035 (syz-executor.4), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 1565.356943][ T4473] kvm: pic: non byte read [ 1565.372605][ T4473] kvm: pic: non byte write [ 1565.378289][ T4473] kvm: pic: non byte read [ 1565.389868][ T4473] kvm: pic: non byte write 03:51:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1eb}, 0x28) [ 1565.420602][ T4473] kvm: pic: non byte read [ 1565.447467][ T4473] kvm: pic: non byte write [ 1565.496065][ T4473] kvm: pic: non byte read [ 1565.507264][ T4473] kvm: pic: non byte write [ 1565.512733][ T4473] kvm: pic: non byte read [ 1565.530330][ T4473] kvm: pic: non byte write [ 1565.535637][ T4473] kvm: pic: non byte read [ 1565.540525][ T4473] kvm: pic: non byte write [ 1565.545837][ T4473] kvm: pic: non byte read [ 1565.558090][ T4473] kvm: pic: non byte write [ 1565.565604][ T4473] kvm: pic: non byte read [ 1565.580299][ T4473] kvm: pic: non byte write [ 1565.669985][ C1] net_ratelimit: 16 callbacks suppressed [ 1565.669996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1565.681454][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1565.687270][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1565.693022][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1565.752694][ T4476] kvm: pic: single mode not supported [ 1565.753057][ T4476] kvm: pic: single mode not supported [ 1565.758854][ T4476] kvm: pic: single mode not supported [ 1565.770328][ T4476] kvm: pic: single mode not supported [ 1565.776174][ T4476] kvm: pic: single mode not supported [ 1566.069991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1566.070004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1566.070066][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1566.075453][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1566.630021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1566.635899][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1570.790035][ C0] net_ratelimit: 19 callbacks suppressed [ 1570.790046][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1570.801462][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1571.270022][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1571.275818][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1571.910045][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1571.915879][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1571.921664][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1571.927457][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1572.310024][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1572.310044][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:52:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1ec}, 0x28) 03:52:00 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\rV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) getsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000040), &(0x7f0000000280)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, 0x0) write$selinux_attr(r4, &(0x7f00000002c0)='system_u:object_r:getty_exec_t:s0\x00', 0x22) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendmmsg$alg(r6, &(0x7f0000005a80)=[{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000340)="09afdf0dee56c884c8aca22ba8730a46a4eb105647653d29d017fbc8176e7d13a45c96c43c487c84b4e2b8aadbc4a6f827b7bc149d9324c1f70c6f033ee1160baaa45577e6a495f384d61e63af81c8a8c507d0280581f2e6d1bda0f27562045ca4a05ad4fd07210aca65da9cc91391", 0x6f}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f00000003c0)="887cacbc7dac1915803afa0a3b72ae3f286aba87d6ec920ec1913fcb3ad8931a292b26c0a221843318f5392cb9135a3eac3c0b3d70ff70233f48be7e31e43df0c023595a934e4ead2b109cef41e4d5d9002c5800d1a00b149c500ee7681c95a69cd4e45588ab6885a3e91cae1a8f1734caa520ebc5127defdfb4f1394860725423a5b90582b267695822662211a850d7bc4f2023b153f8ebd11fe50d2286a3b0c09f41943d6986d61dbb6a", 0xab}, {&(0x7f0000001540)="ab2ba55c9e14bb66ab46208af57362a367c4d42327ba7c83b90e0c7420f8afde5bad59d394ac27b2827c3b07bbcaf3b5e98b8fec9a93d71704ff67d8b04a7868681cc9688c56057f0ff192932fdde5c177d1a8af9ed1ee6e52a160e92a99ca8379cd8056ddb8417fce7c3c7aba80bcbf1d8403453a2abd2d082e668e1b2853a7558a2badae6f357f547a70becffde5f0650310d3d520ac3aec3c6c87c250db7037127e7ffcdff6ee4b9c14fddc932ddf048c7040793e724064c9cd41639a0acc1d9217ced6cf40e89713948eb8cab0a7db172f9cf6241d0acd", 0xd9}], 0x4, &(0x7f0000001680)=[@iv={0x88, 0x117, 0x2, 0x6f, "47561519690c7286b86a6304a149d91a61f427327bd8f280ff77e0692c9c3c6d03b05168708a4cccb60e5ff0b825ea29bdcc8af68a4cba3ce966ed282fda70e32ff2b3c4412e6f7c0768dbaff2be255f44157ea268e93539b2bb87a340a04e9cc7ac190a6c67bb427c6d94f7958a7d"}], 0x88, 0x4c47f037fa52eb73}, {0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001740)="bf5e0a93aad8e28cc04d3f3dbe1e4c682ec060dbe2052dabaa165b1a72af0cf78d2ed8bf9ceb6952c96cb16d3c209da404ca2c905faf4d816c9e32afd87665c3de1708df", 0x44}, {&(0x7f00000017c0)="e5244bd21aa294e47ff4b31af399f0111bc08f2b3c798c0f03ccd60e081806db1e2df62bc8502a044f265a0c0d9e729ee746bd3d8f78f1c41cb008cdbb72dd0ae587533bd967248e2e0dda9b314322ac37173872c49fc1d4669674a1908abeef3bf4538a7ca9928b1314317714055903aa4d264cc513f7353cb1490d673f7a41f29630167511ccb9d945a21a6922d1568315597d47b022e370c1fe1515cfceaf1bd2cec28c9a89319d8ca7884ec2d440776db84c01a425c8528b4f61fbec563ff2e816d66fc5ffbfc5644a537df64d40a660e375faba41d75a75a2e1588bc061db047eaa07422432893395e9a3b352d4f5e1b606454553249c", 0xf9}, {&(0x7f00000018c0)="7709c7176a4ad52b88b5578556557146e6c42cbaca8ed3eaa30910e786dfddddb4bd1c6adf9b176de37df95a8c4046908fc4d7236021723155867d3333b5b475346045c82913f46badc4f8453f8c6ed8cba063430ef55a285b85a111ca9b949cec0db359bfb6973452ba8d0d707a945135be6ac37cac35ccc8ee", 0x7a}, {&(0x7f0000001940)="e05694121fd17696c11cfc1c06fc8f48d14002d817e755582233273a931c9a4ab7f8b457d869286b9c7e65f0cd698c47756247ef2f31c3d64d4da6b50c99001207b944c5bcc68591e0de4398ce5a34284344744c", 0x54}, {&(0x7f00000019c0)="cae8736290abaf65adee9425c461253ff36ba111e477c1aab309686107b8cfd6e07d", 0x22}, {&(0x7f0000001a00)="41f4e0ba2d7335383f7affeeff4e1dc287c2c1b993a166f80bd00ad1a2a5dfc39c349c45b46005f0bea7b87b17cd11a9c2557915463fb8c0baeac715f5f731df938af0e8bb19062d7b2e2aecccd3e06d76232238fde245d5e3adc734c845a4442329bc2456954d420e9a48685ac775caef6a20057eb68735dc1fcf1a4ee2d3aedfca91d947889c693b9988f072d7fd1cf3f3381daeec633384beb9bd53ffab750dca193f509efb74b622ccddab5d0c8e5e224ba724532af87985a13fa40e4205b2a2cf23bb16f3d2ae1f6db829d8ca4f4797ac14437ecd491ec070d3b82da357", 0xe0}], 0x6, &(0x7f0000001b80)=[@assoc={0x18, 0x117, 0x4, 0x2}, @iv={0xb0, 0x117, 0x2, 0x9c, "b9fafee9745d6588ab5008fd4895b8a8544de9e9c2065a316cb11f7d31d567eba8ae40f9016972926d61b6c2f80d7ff16da74b50c1e850154c08f59c534e4bc2f3e77815a5c25cfa019007ddfb3eff4e185e8dc8cbeb9aafeeb8289844811cc5cc939fff7404c513237da4bcb9804f230ca3d31826c19bc02d15785a4e9cfb171109f3ce599ca97f12959d7b126ec964d63c456b7edbd6f000e25b6a"}, @assoc={0x18, 0x117, 0x4, 0x400000}, @assoc={0x18, 0x117, 0x4, 0x1f}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x48, 0x117, 0x2, 0x2d, "839a2726eed22421c3784ce8ccb1beac6f6e530aa5ae296a9cd7fa30c238d3b8922f6fece63bc13f38acd34458"}, @op={0x18, 0x117, 0x3, 0x26eeb1c054d17d74}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8001}], 0x1a0, 0x8810}, {0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001d40)="ec21397c91f7af3fa3055fd5b1be2444d3b2dab62b93a1a6cef80eac63983d39f655f5069a69859926a57b7ebf9311d14beae41e1b1c7858917d42c1fe7115aa664a09c0542809e895b5cb3f217df3baba70713f8c964db957192f501457fc423afb804068e4804097b3ddfc337f3e225ac095a0e9825454ce7b70661ea7cdbab7e9b76b8e38ef34729b8d3aba26447ca44dee2dd454ec373f9b1c252f1a5cf362639b59db972211ec2605938e6b4cc67e4411a4a7bc5f24d117f905713f81", 0xbf}, {&(0x7f0000001e00)="03d0992a77603bfc6b783620628b8aae9ea8fc50746a9cc3f71c577bed923baa8640c7249a5ad25376874bc5620ef0eb1294ac715d9a79ce0b15abd452a9319a2a57746d5f9c0622e9dfe468fa691cf9af989fdc9e", 0x55}], 0x2, &(0x7f0000001ec0)=[@assoc={0x18, 0x117, 0x4, 0x7}], 0x18, 0x801}, {0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000001f00)="a53c9d477ec818f4ee9a3f2f66c9feee427421b202eaa93c3109279b2b0fa94fbf6626ddd35af092fd61f7c9d240a3a3327899be02fed8d44b05b7ffffaa8334fce9b3fb51e1f659aceb7c24ece56eab817df0fecf5d496bcfbfb1e09ab432cc8f79c7883a7f3c4f97cc39083fa3096c19dac78443a45fd8df9d41f4e7f09361d79f1fefbba0b6a9e085e3b178ef99976ad33f67ea749c2b66960089518ba3e0af9f7a193c0dfeb60eda419bf69ed0f52c797fec5057c607074a6355e71f4e00", 0xffffff62}, {&(0x7f0000001fc0)="1df7bb32eab4b7e64470c6b21e6fadbcd3602fbf9a91846293a00468de0a98aa7e120dc570bfc0d9152a333dd58bdf078bc3da96d206a9ac9facd4a1b4134a4d6c446e6a0873072f67ea3e5db279de7c8ad3e9a0a9e10a309562557e489896946d1a295ed2ffcc25e65a1731e2cc505dd61c775f5068af1f1b", 0x79}, {&(0x7f0000002040)="7e5a5e0c3b65d1f7e781af9ef539f600783b97533894778672d86b7e8ef638d052c99d9a695760da8b2dcd31c68b00ff3b8de3a2d170cf35088fb84a2cc2f9137baba670143d9bbe8e28f3f43d3722eb13a240839f30535394a5130521d4d3af2f37545693bbb8f00d91843dcd4308745b4b3ed8694daea88cf1c80086179aecbf2300ce6b2390f2e22c3664bf494a82ea5ad7c69c2fe3e2377d4323320bee0ac4c216691cf83147b99f03c4e343b25a6cafa3c321df4d0931e9f5e13ca0b4e1db7d87307cf6609d8dee5e259a31e77f28f4da6fe7c716c2e08fbecc9275da2a70472650d9244db7acbf8dde833f94efa99f", 0xf2}, {&(0x7f0000002140)="09214c47b1e434204f7610e17a6b2cfcaaaf465c29c3031de461bcaa0bb358c3992293c2a44d7fef5d4ab6a5b5d8ded101ad6c750d179be457f52612c7eb509d53019d0b9454695cd63450bea1b3c0752b6162336986821c6c669d46f445647213166f0994e0f3f4e8ba57e7fd553bd58027adff7f2238f206427e31ad285325f00524c0cd4265d78275d503d512c612e989fe40582ad1402a21070599eb84120f8368d27f6e2b4cafddac5a8979c6813ce58cc2bd60f49b21a4857597017e5390955dad50a08c156ee7920a0b29bdff2edd04180b2b90d8da71aa0e55fd7481d3bd67a5d752b40cb980e87a566ef867a2f90076", 0xf4}, {&(0x7f0000002240)='=X(', 0x3}, {&(0x7f0000002280)="03f9b108e4e8493021207f87a772fa42498b1602cf920b088bf95f548d4b", 0x1e}], 0x6, &(0x7f0000002340)=[@iv={0xf0, 0x117, 0x2, 0xd6, "40824c06d562b0f28516d0f558209d32032b07c9d4b5692ebbfd30843162b2baa1574d7f3dadfd3ad63dbfa85b596ac6b2d39cd8ba3ac37407171c0eff89dded8ab1cbe389a290c35fe5f7a40181c9430afdf1b832d62ceae933927f508ed04d0799856afdb02f2ad69547ce4791aa86cb91518efe09f1d881b162e777e337e21f918df8a257943a3d9db2ab0900c2adcd1191c674ac636f9af14e9a0d18f6d4907932d5c282c96ed0d4bdc9ed953a0c81a2ee318d6dd01ee342dd48e4930badd769f5e10cb1a872c730ce0e23689711c6a094dc3c11"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xa0, 0x117, 0x2, 0x87, "4cf4046431e213219d056a6b640b007b00eac79a143568c923f1feed5074ce70aa2b6f949871ae0aab653fe7b3f4e3bbc596662a44582c4456d40a87ff724d16da5ec1ec912a80ddcbac50638c12fa85800cdb8a3985e891883bfb348d33e7db8ee6a786f1800af0abfdc41aecd6cda23f38213377a18ee86b5d218f7db97da79d05e2082450e9"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x1d8, 0x8000}, {0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000002540)="d78491f7107c13d81dd7a671b968941ec682eea4d5e2991e828ff8550db4880cec0181e51c12863f30426f319765f046f3e718f00ff77d95ab17c220b24cdbca7acdcab99335781a7a9820030788c1db0396f4bc189e470dd746eedfae56c9b3b0d783bd2edbb08740fdee27d909734cc4ec1f4b5b04994969240ca691c2a20cbe43bdc79772d2abb819a5c25e38291480ec0479a3cce2e1b46b7c31c9d3be523ef14a475085136ce7bb7e37fbdd48930424c22657c352321e1d02117a6b2f178521a9137f2cd2750f7fedb0f097990c0850ff48cb9af61d17dd9776f4a24fee74d2121ace10dc31d406fde54a031cdf620f92b88c89aa977fbf", 0xfa}, {&(0x7f0000002640)="bacee73d454e529f85da994a103685b60b8224dfcf299279dabf1ed60f90d847e6537d5158013f32a62fa1b707faf6053dde5fa134d0c877c79951d182d06d3b883e72f755ce8fd447da9c2739106478468619672c79d4b956e3462c0b5f94af6bf75ccd513001d50f73d8870a1cb06178c59a876da1715369e832292e2f7b95aa28578fa23504de66b271b35f0518583935693d8d52e1302f83984b4df5e1d45c8f657fc33e2184cb176712332537d9d8ff213ff9a1d2674268630b6f08723c600f2ba725c2c791c2275e33991eedd8157f65804f459a126d7c4643802a192084", 0xe1}, {&(0x7f0000002740)="12fc6588b34eeb01d2a32edc1fe7a71ab828e72455104e7eebe15ba63694475f40db3e08ef15bd910540bbbc6bf454d0cecd8a4ed3120d81259e1d2d3dfd032fd07a265793c796eb794ec8fa7b5df50c3ac35f60c123e81e5fa500d90e622f48fd68efac5c73bc28f728c7c81bae67b24b6b767ce3e01fef224d8b233d415e9df9248950cd2e001dd27c19fd4389bedfbcf506e36e2df5687f5f2a65ea84b19c0953bd84d9a919749960c6e186f01b3ea79244fc5bfb5e897580", 0xba}, {&(0x7f0000002800)="04af370747e616a84afd316b50fd6a963892fb738056bfccd8efae0012d38ea38caff8c2b7d0ae18c9a860f997e17cb0add318", 0x33}, {&(0x7f0000002840)="cb2b0c90823f40afaf7b213ea83e16dc0ce5183560e84289514999b0f7", 0x1d}], 0x5, &(0x7f0000002900)=[@assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x800}, @assoc={0x18, 0x117, 0x4, 0x800}, @iv={0xe0, 0x117, 0x2, 0xca, "986b216633015a2234db9417bb27eb837a757ae24db62148218d6ed68eb4c64905542f1846c14eb1de7482ef436b4a69d2c71f54916f3df2f8ef1b44ef03f6edc43fdab5f47957f4f27cd7d709829702ebac019d0afc567d2b2f25a80397a661202dc78c9d6410eb050faeabc4ff50c1da16e0fb27ac130fe5fc62766567434925e66cd1ca841d2b7a9b44079b4f1ff8e8710d36668bd6f7229799daf8feeb4d6bdcb0db003cfaef77089100ff6862f206e42c74556632a45ff9cab0744c533d141d9a330a39964af3d7"}], 0x140, 0x4000084}, {0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000002a40)="885798e9e4e55eccfb1f470c907e648255ca17e6e0ae187435e0116b48d2a6357cb5dd4501bcb11f3a3768bbd59bcd67126f603e481a72be2de9f8f629b855cdf981f0d0a75104c9ba14f5ba33678ba1b887f713e4d103185094a1fa0f3ab2b118b0cc6253f2848af00679e77f8b71e4d177ea26983d4d041b19bee48f1585f8bd93947577ebd3ba7a8becde0e64fe50ce43d54094aa90f1a8eee4312ba7d67e5e76a63f5d46ce14da405ce9d0fc2e45a1634f74c97392234e5c7e27f7d95471c40ccfb6fe86aa33dd83b34a6bf5e745e425fe363f49eb65013a2cce6bfa0d4a85aafd43f120d1c2d93258c394280c", 0xef}, {&(0x7f0000002b40)="165fd005da1d7057b7e3e2afbe8c375756b37cc045e40891c7aa7fdc25346f3fbccced931c6613e136f0568eafcfd35335ad1f73a98cf48c9fdd433780a748504380d1b1b574d60ae580857dfcc7fef3eb10eb1c32392f4bb52302ba3a940da9306bf2e6fa42e09721dad369c874e441d940ac94c9c2a4f0c50c8e129130b485b268d4788be98b6973b1aa77956e07afb0d9f031a86e6b4e1b1806c3f01a0f78ba7ff9f1614d9cc7420d2630f16d275df79c8a99fec009eeaf33e20a1c596ea1e2f0a82f0eed696bb099dcc8eb4989916746628eb36dd943d5d61bea562b49ce8f66b9e933abd1e77f0ac897250dede8bca49760", 0xf4}], 0x2, &(0x7f0000002c80)=[@assoc={0x18, 0x117, 0x4, 0x9}, @iv={0x110, 0x117, 0x2, 0xf5, "49aa4e05cc36b2bd01df6cd37a246f56bf5c59a9f6eb47ee3bdcd50f5d4b0394d3a776ab6432531b6f1d9ea2a173bf0e683da819596fcc42141e30dfcd9740cfd2bb97a02557d5014af3d282a3314b58bc9c96bee5ce4fa7e0447bca79558d3c2c7f901827917f057ece33c0c1aac2eca693155050b2f56127a3b25838eb1d3ffc28b9efc509fea3b55b0edf35470de592cbb4248698c521f325484d77dfa8de67edf8f463f0d657644444d05c90ea9cff4861d0fdbb1c6291827674b2d1a9f51e70db6e8eb14e54abe8bf6d95bb34093b0335e22dbafef3e2532f254dadbdc174b70083af93ce86972764eba1e313bedd4306528c"}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x140, 0x4000000}, {0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000002dc0)="1fa0d6d0c9e390ef68329b880794d3e111f31aebaf6801bfc6d3a63426cd3b1939a36d62d3ae63ce0f0f6389a5fd55980fd6ceb9899389e758e50c9e7df105bf70066ee2892bec171debcd16adb772e731", 0x51}, {&(0x7f0000002e40)="87fa8f838b3f6e1b6c9b98033fa7", 0xe}, {&(0x7f0000002e80)="2b89058de493dffb515e0b9a11cd294e0fe5f51a02a87281a86db7c6d79817fa410807bf7074", 0x26}, {&(0x7f0000002ec0)="9851fd8b43939f4560dd905d29129d65d9fa6fd00674abc6493fde9bca78d814269d1f210d8746fe0bf19e94cd", 0x2d}, {&(0x7f0000002f00)="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", 0x1000}, {&(0x7f0000003f00)="d7f9d2eb69fc7a7f7d71612b961e64bc16c62d5eb773e9ba821cbd9d816804112fd1e15716660213feba94fc44209a2f915cc634917bd8a5ae6a83f79a3dcac13637e80ecd435647cb9de44d3753151a462720051ffdc5827716710c46cee06e2f777916003fe02b4dd7dd3d0cd60285739f027b0620f3c856b7ca5f8ab5a56a2db2decbb0fff779d05f28482594cff2aec3de093520095ac28bf84b23b61600bd3756105295c8471da727f7ebd6f7819bb95081cf9821a2f5b62f235ded", 0xbe}, {&(0x7f0000003fc0)="917b60fd37ddb6cabfb17ea1a2c76a7c21682c33f238fbcd102aacc8d092be35df4e9c26cc5c70682ff44886b5bcbb4df19c38824be9d2783e10aaac1c276059a7e69acbcec2d37ccfe5c7aa99a81fd02ef363b7dc44cfb48c2ef546c61786056561d3dcebf5847d5ea16751fc02569511680a59026d712159f79e6c91df8b", 0x7f}, {&(0x7f0000004040)="85453ae71a1516348ade6720ad2760ce8c2212673151017588cc052bdc6abceb0009e658a1ab2af66e4874eb890a8d4f88d98fe80d292b46807ea74d231b0efedb32a4c8c0d78cc30669e250301e0d623dfb1fe5703d0adcda07e78b6c1575c9b401639ac7bf60c05cf2ed7d08e1fd8e97226a9a20649c40bbebf233fdda7136a653f4f00f6b13b10ade87ec700b151663c7c82e01f2d61e2cad9813e6ca3c87761382dc94e088a617bb145d49ae627403be1969a82829b042212df0fb79271dade98238", 0xc4}], 0x8, &(0x7f00000041c0)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8000}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0xa0, 0x117, 0x2, 0x85, "ef57e752e566aaffdbcefe237bb05ebb1b355074ebbfa75cd2a3b4fe71ad2455993ab23403e5603997996387f0eab540c7e07c3bb45eddfb62afc79212806802b2aa0f9d47b57edb7c169351380529ed93738863b51ea54b60ee1c6503bc8d939de1c6906800515172c38ae3c59fb06cb94dd81343644e98e91debc6e3c00a8b31065ef0b4"}, @iv={0xf8, 0x117, 0x2, 0xe3, "05d9fb9107a5d67f076d6cf1f5206c1fc607d9505a6efcab0a69cdd6f254548fddf1f6de118cb41a824842f70b3d3e6c17d61882d191fb762dd0b342e52863bd3871cf57414f3a4a464506f4319f21eb76abeff57e0f801ddcd0cd13b81273dbae7ceab3dbb640ba8a560506beaa7756dbd58cc6c2d948bc4668b822d6ebe0f300e9004798aa38b19f24237abd73a5441cb757d481784729a6aebec0fc69169a515cdee9c7194704059f265b9aa0124b7d8d014643d5c7cd6c30785111f8e80d35907a47f8ac1ff8b9198dfd65af9b0abbb19b7b0d1b3209db94f76d24c30538255bae"}], 0x1210, 0xb62b20dc780a5ad3}, {0x0, 0x0, &(0x7f0000005540)=[{&(0x7f0000005400)="d7dad08f8a6bee5f3bed43434f8641453ffd7ce0192efc9e02d0c3af807c40e2c28b724c283dac508d1a2f62d90fef6f32f1be2032bf0f57f07b27c83f63fe2eb03e88020f256c0133774880a6f25a8f98f29c51cfdb85ce0e85929a36a6c40085506b5738e190db895a097af4d78b1faf4fbcc1b6fb3ca34fe41aacdeec9dffb340ae8becf1429b279e64e3afafa3ff0a0ea17842ee6ac091dfae811f3072ec38a15ccfd5b7fd10d8b37ab0e7b380118d5ee9d8b45cacf97419bcc275535a5dac0e59bbd04bc9a46c53b10559", 0xcd}, {&(0x7f0000005500)="e8dfb7f5e653f53e4de3a4", 0xb}], 0x2, &(0x7f0000005580)=[@assoc={0x18, 0x117, 0x4, 0x5}], 0x18, 0x890}, {0x0, 0x0, &(0x7f0000005700)=[{&(0x7f00000055c0)}, {&(0x7f0000005600)="dcda5a1f646ae5d017591c682986076f7433177b56a49f02cec07f04e51e41a1ad44722caf64a1b47ad34dc732bfbd3ea1069e6043d53d218eb8c68e2e95bb93e0db85367b9ceb8d5dee58a8635080230213e6d4c51c6decc42193e956a92781108718b29c8f5a3f8cf18bea81c3e38a2a67e83f87665a91c8756be9f8f73f755696121169394e5a4ee782d141f28f9131a569fd7ef6b6a9e7a7dabaece16b21e4bafa14806536beaf61c40459d5aa71122c261706375b1ff881a51852a1fc040ad9cd326b2c1651e989d52d65ce395b8b436fab01095ff7", 0xd8}], 0x2, &(0x7f0000005740)=[@iv={0x18}, @assoc={0x18, 0x117, 0x4, 0x401}, @iv={0xa8, 0x117, 0x2, 0x93, "4c5d05a19d254088107f4104708910d134731c28e60a54ca2d308f568f72957efbfcec054c43667134bac42139ac6eeb703db5b6083cd184fd75795a511e710c33461190fcce2c7631288c6bd8ce5d5bcd07d1b276cdc979f03d82ac7c75df19b58526ea5133cde1ee8e92cbc6b2789275c2327e753b2a50b38d7fd534000ab02f13a8d52f96a7a46129b614519e5f1eee0c6d"}, @iv={0x58, 0x117, 0x2, 0x43, "4f56d752a5959014818af3a1855a592ae8fe968955226959b576228d4b81fff231179341cad6feb16efe298d99354a84d40873b49580e38eebc959e6088905de2616c8"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}], 0x1c0, 0x800}, {0x0, 0x0, &(0x7f0000005a00)=[{&(0x7f0000005900)="84043bf732276abe1ea9156b8e778ed6c69d58e6363e14493c8b811c269c3973683ea2e18d3b4f038c514071504762f852bf2c05058dc6a6ff20f0cae3b3c2f01b887ae4c96f989f0116effdf856de84f5ab709dedddca09dead", 0x5a}, {&(0x7f0000005980)="35c22543a233c554ad1753c21e45be6753b6710baabb48aef735ac838fec912a5c057caa9e84ca08d679d303d871ae178df4703755e8d3556579f253daf13bd49f8b8a82f15d76b2e96ace360f42ba2fb3f014bec8d91cbfd1be54e713647b35afd18015332b79168ff26c9e321fbd77f0de7205e48f8b66320f", 0x7a}], 0x2, &(0x7f0000005a40)=[@assoc={0x18, 0x117, 0x4, 0x4}, @assoc={0x18, 0x117, 0x4, 0xfffffffb}], 0x30, 0x4004052}], 0xa, 0x4000040) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000055c0)='/dev/uhid\x00', 0x2, 0x0) 03:52:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000045000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cr4={0x1, 0x922008}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:00 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 03:52:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1ed}, 0x28) 03:52:00 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 03:52:00 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) pipe(&(0x7f00000003c0)) socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x40, 0x4}, &(0x7f00000000c0)) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) set_mempolicy(0x8003, 0x0, 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r2, 0x1000000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x22}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 03:52:00 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x0eV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:00 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 03:52:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1ee}, 0x28) [ 1574.037997][ T4513] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1574.048015][ T4513] CPU: 1 PID: 4513 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1574.056377][ T4513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1574.066443][ T4513] Call Trace: [ 1574.069732][ T4513] dump_stack+0x11d/0x181 [ 1574.074108][ T4513] dump_header+0xaa/0x449 [ 1574.078477][ T4513] oom_kill_process.cold+0x10/0x15 [ 1574.083577][ T4513] out_of_memory+0x231/0xa00 [ 1574.088191][ T4513] mem_cgroup_out_of_memory+0x128/0x150 [ 1574.093730][ T4513] try_charge+0xb5c/0xbe0 [ 1574.098080][ T4513] ? __rcu_read_unlock+0x10/0x3c0 [ 1574.103092][ T4513] mem_cgroup_try_charge+0xd2/0x260 [ 1574.108341][ T4513] __add_to_page_cache_locked+0x163/0x780 [ 1574.114045][ T4513] ? __read_once_size.constprop.0+0x20/0x20 [ 1574.119945][ T4513] add_to_page_cache_lru+0xc4/0x260 [ 1574.125127][ T4513] generic_file_read_iter+0xf30/0x1440 [ 1574.130577][ T4513] ext4_file_read_iter+0xfa/0x240 [ 1574.135617][ T4513] generic_file_splice_read+0x35c/0x500 [ 1574.141212][ T4513] do_splice_to+0xf2/0x130 [ 1574.146289][ T4513] ? add_to_pipe+0x1a0/0x1a0 [ 1574.150863][ T4513] ? add_to_pipe+0x1a0/0x1a0 [ 1574.155441][ T4513] splice_direct_to_actor+0x1a1/0x510 [ 1574.160842][ T4513] ? generic_pipe_buf_nosteal+0x20/0x20 [ 1574.166377][ T4513] do_splice_direct+0x161/0x1e0 [ 1574.171211][ T4513] do_sendfile+0x384/0x7f0 [ 1574.175754][ T4513] __x64_sys_sendfile64+0x12a/0x140 [ 1574.181020][ T4513] do_syscall_64+0xcc/0x370 [ 1574.185525][ T4513] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1574.191425][ T4513] RIP: 0033:0x45a6f9 [ 1574.195309][ T4513] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1574.214940][ T4513] RSP: 002b:00007f781575bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1574.223403][ T4513] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a6f9 [ 1574.231435][ T4513] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000004 [ 1574.239406][ T4513] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1574.247446][ T4513] R10: 000080001d00c0d0 R11: 0000000000000246 R12: 00007f781575c6d4 [ 1574.255411][ T4513] R13: 00000000004c8fb9 R14: 00000000004e0b38 R15: 00000000ffffffff [ 1574.265499][ T4513] memory: usage 307200kB, limit 307200kB, failcnt 3550 [ 1574.272405][ T4513] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1574.279241][ T4513] Memory cgroup stats for /syz4: [ 1574.279493][ T4513] anon 283623424 [ 1574.279493][ T4513] file 0 [ 1574.279493][ T4513] kernel_stack 4202496 [ 1574.279493][ T4513] slab 5373952 [ 1574.279493][ T4513] sock 106496 [ 1574.279493][ T4513] shmem 126976 [ 1574.279493][ T4513] file_mapped 0 [ 1574.279493][ T4513] file_dirty 135168 [ 1574.279493][ T4513] file_writeback 0 [ 1574.279493][ T4513] anon_thp 264241152 [ 1574.279493][ T4513] inactive_anon 135168 [ 1574.279493][ T4513] active_anon 283623424 [ 1574.279493][ T4513] inactive_file 0 [ 1574.279493][ T4513] active_file 32768 [ 1574.279493][ T4513] unevictable 0 [ 1574.279493][ T4513] slab_reclaimable 675840 [ 1574.279493][ T4513] slab_unreclaimable 4698112 [ 1574.279493][ T4513] pgfault 100419 [ 1574.279493][ T4513] pgmajfault 0 [ 1574.279493][ T4513] workingset_refault 264 [ 1574.279493][ T4513] workingset_activate 0 [ 1574.279493][ T4513] workingset_nodereclaim 0 [ 1574.279493][ T4513] pgrefill 832 [ 1574.279493][ T4513] pgscan 9653 [ 1574.279493][ T4513] pgsteal 6001 [ 1574.374437][ T4513] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=11362,uid=0 [ 1574.390075][ T4513] Memory cgroup out of memory: Killed process 11362 (syz-executor.4) total-vm:72712kB, anon-rss:2200kB, file-rss:35780kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1574.408999][ T1070] oom_reaper: reaped process 11362 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 1574.413474][ T4512] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1574.430103][ T4512] CPU: 1 PID: 4512 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1574.438409][ T4512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1574.448452][ T4512] Call Trace: [ 1574.451726][ T4512] dump_stack+0x11d/0x181 [ 1574.456041][ T4512] dump_header+0xaa/0x449 [ 1574.460462][ T4512] oom_kill_process.cold+0x10/0x15 [ 1574.465555][ T4512] out_of_memory+0x231/0xa00 [ 1574.470146][ T4512] mem_cgroup_out_of_memory+0x128/0x150 [ 1574.475693][ T4512] try_charge+0x7f5/0xbe0 [ 1574.480105][ T4512] ? __rcu_read_unlock+0x10/0x3c0 [ 1574.485153][ T4512] mem_cgroup_try_charge+0xd2/0x260 [ 1574.490436][ T4512] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1574.496094][ T4512] __handle_mm_fault+0x17ab/0x2c70 [ 1574.501198][ T4512] handle_mm_fault+0x21b/0x530 [ 1574.506016][ T4512] __do_page_fault+0x456/0x8d0 [ 1574.510761][ T4512] do_page_fault+0x38/0x194 [ 1574.515301][ T4512] page_fault+0x34/0x40 [ 1574.519511][ T4512] RIP: 0033:0x411eef [ 1574.523396][ T4512] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 1574.543040][ T4512] RSP: 002b:00007ffc28b19f80 EFLAGS: 00010206 [ 1574.549107][ T4512] RAX: 00007f781571b000 RBX: 0000000000020000 RCX: 000000000045a74a [ 1574.557066][ T4512] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 1574.565070][ T4512] RBP: 00007ffc28b1a060 R08: ffffffffffffffff R09: 0000000000000000 [ 1574.573048][ T4512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc28b1a150 [ 1574.581060][ T4512] R13: 00007f781573b700 R14: 0000000000000001 R15: 000000000075bfd4 [ 1574.589884][ T4512] memory: usage 304748kB, limit 307200kB, failcnt 3555 [ 1574.597119][ T4512] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1574.604097][ T4512] Memory cgroup stats for /syz4: [ 1574.604253][ T4512] anon 281452544 [ 1574.604253][ T4512] file 126976 [ 1574.604253][ T4512] kernel_stack 4202496 [ 1574.604253][ T4512] slab 5373952 [ 1574.604253][ T4512] sock 0 [ 1574.604253][ T4512] shmem 126976 [ 1574.604253][ T4512] file_mapped 0 [ 1574.604253][ T4512] file_dirty 135168 [ 1574.604253][ T4512] file_writeback 0 [ 1574.604253][ T4512] anon_thp 262144000 [ 1574.604253][ T4512] inactive_anon 135168 [ 1574.604253][ T4512] active_anon 281452544 [ 1574.604253][ T4512] inactive_file 0 [ 1574.604253][ T4512] active_file 32768 [ 1574.604253][ T4512] unevictable 0 [ 1574.604253][ T4512] slab_reclaimable 675840 [ 1574.604253][ T4512] slab_unreclaimable 4698112 [ 1574.604253][ T4512] pgfault 100419 [ 1574.604253][ T4512] pgmajfault 0 [ 1574.604253][ T4512] workingset_refault 297 [ 1574.604253][ T4512] workingset_activate 0 [ 1574.604253][ T4512] workingset_nodereclaim 0 [ 1574.604253][ T4512] pgrefill 832 [ 1574.604253][ T4512] pgscan 9690 [ 1574.604253][ T4512] pgsteal 6001 [ 1574.698587][ T4512] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9735,uid=0 [ 1574.714093][ T4512] Memory cgroup out of memory: Killed process 9735 (syz-executor.4) total-vm:72580kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1574.733549][ T1070] oom_reaper: reaped process 9735 (syz-executor.4), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1574.767325][ T26] audit: type=1800 audit(2000001121.959:79): pid=4513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16757 res=0 [ 1576.070032][ C1] net_ratelimit: 17 callbacks suppressed [ 1576.075772][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1576.081518][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1576.087287][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1576.092999][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1576.469991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1576.469997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1576.470037][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1576.475775][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1577.029998][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1577.035808][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1581.199997][ C0] net_ratelimit: 20 callbacks suppressed [ 1581.200009][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1581.211426][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1581.670002][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1581.675788][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:52:09 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:52:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r4, r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000280)={{0xa, 0x4e21, 0x45, @remote, 0x3}, {0xa, 0x4e24, 0x4, @loopback, 0x81}, 0x0, [0x3f, 0x3, 0x0, 0x4, 0xfdc, 0x0, 0x10000, 0x5]}, 0x5c) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:09 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x0fV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1ef}, 0x28) 03:52:09 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) pipe(&(0x7f00000003c0)) socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x40, 0x4}, &(0x7f00000000c0)) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) set_mempolicy(0x8003, 0x0, 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r2, 0x1000000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x22}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 03:52:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f0}, 0x28) 03:52:09 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1582.043781][ T4538] picdev_read: 59 callbacks suppressed [ 1582.043794][ T4538] kvm: pic: non byte read 03:52:09 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x18V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1582.088785][ T4538] picdev_write: 59 callbacks suppressed [ 1582.088799][ T4538] kvm: pic: non byte write [ 1582.110357][ T4538] kvm: pic: non byte read [ 1582.118561][ T4538] kvm: pic: non byte write [ 1582.129710][ T4538] kvm: pic: non byte read 03:52:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f1}, 0x28) [ 1582.135641][ T4538] kvm: pic: non byte write [ 1582.142120][ T4538] kvm: pic: non byte read [ 1582.146885][ T4538] kvm: pic: non byte write 03:52:09 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:52:09 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x1aV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1582.304233][ T4560] kvm: pic: non byte read [ 1582.308741][ T4560] kvm: pic: non byte write [ 1582.313255][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1582.313291][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1582.313330][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1582.313357][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1582.710006][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1582.710068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.469990][ C1] net_ratelimit: 18 callbacks suppressed [ 1586.469998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.481523][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1586.487258][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.492981][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1586.870009][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.875789][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1586.879969][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.887264][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1587.429991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1587.435780][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:52:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f2}, 0x28) 03:52:16 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') sendfile(r0, r0, 0x0, 0x9) 03:52:16 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:52:16 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x1bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$setown(r1, 0x8, r2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r5, r4) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x590d, 0xb08, 0x1, 0x6, 0x7}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000002c0)={0x6, 0x6, 0xa, 0x4, 0x774, 0x8, 0x0, 0x3f, r6}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 03:52:16 executing program 4: 03:52:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f3}, 0x28) 03:52:16 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 1589.431950][ T4577] kvm: pic: non byte read 03:52:16 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\amy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1589.455102][ T4577] kvm: pic: non byte write [ 1589.471730][ T4577] kvm: pic: non byte read [ 1589.483823][ T4577] kvm: pic: non byte write [ 1589.496568][ T4577] kvm: pic: non byte read 03:52:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f4}, 0x28) 03:52:16 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 1589.521702][ T4577] kvm: pic: non byte write [ 1589.527076][ T4577] kvm: pic: non byte read [ 1589.551317][ T4577] kvm: pic: non byte write [ 1591.590016][ C0] net_ratelimit: 22 callbacks suppressed [ 1591.595686][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1591.601434][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1592.070037][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1592.075880][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1592.709996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1592.715786][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1592.721520][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1592.727236][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1593.110013][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1593.110020][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:52:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:52:23 executing program 4: 03:52:23 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\bmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 03:52:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f5}, 0x28) 03:52:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00', 0x1402}) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r5, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0xfc82b3f89699a7ca) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r6}, 0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000400)={r6, 0x3abc, 0x81, 0x1, 0x4, 0x8}, 0x14) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={r6, 0x4161}, 0x8) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x20, 0x0, 0xff, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe2}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r8, 0x8070ae9f, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x4200, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r10, 0x40505331, &(0x7f00000002c0)={{0x2, 0x7}, {0x7, 0x7}, 0x7fff, 0x0, 0x8}) ioctl$KVM_GET_PIT2(r9, 0x8070ae9f, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000040)={r9, r2}) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) socket$inet_dccp(0x2, 0x6, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$SG_GET_SCSI_ID(r12, 0x2276, &(0x7f0000000380)) openat$cgroup_ro(r11, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 03:52:23 executing program 4: 03:52:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 03:52:23 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\tmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:23 executing program 4: 03:52:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f6}, 0x28) 03:52:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) [ 1596.880028][ C1] net_ratelimit: 17 callbacks suppressed [ 1596.880038][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1596.891464][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1596.897217][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1596.906032][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1597.269989][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1597.270008][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1597.275794][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1597.829986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1597.835840][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1598.310029][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1601.989998][ C0] net_ratelimit: 20 callbacks suppressed [ 1601.995657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1602.001401][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1602.470005][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1602.475769][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1603.110003][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.115788][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1603.121567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.127362][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1603.510003][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.510025][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:33 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\nmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:33 executing program 4: 03:52:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:52:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f7}, 0x28) 03:52:33 executing program 1: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 03:52:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x800}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, 0x0) ioctl$EVIOCGID(r5, 0x80084502, &(0x7f0000000540)=""/4096) 03:52:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f8}, 0x28) 03:52:33 executing program 4: 03:52:33 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\fmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1606.118277][ T4634] kvm: pic: non byte read 03:52:33 executing program 1: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 03:52:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1f9}, 0x28) [ 1606.166527][ T4634] kvm: pic: non byte write [ 1606.173598][ T4634] kvm: pic: non byte read [ 1606.192001][ T4634] kvm: pic: non byte write 03:52:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000040)=""/20, 0x14}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/157, 0x9d}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00551) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f00000005c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r1, 0x0) shutdown(r4, 0x0) 03:52:33 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\rmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1607.270035][ C1] net_ratelimit: 17 callbacks suppressed [ 1607.270043][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1607.281673][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1607.287443][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1607.293338][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1607.670020][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1607.670039][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1607.675815][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1608.230045][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1608.235877][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1608.710016][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1612.390004][ C0] net_ratelimit: 20 callbacks suppressed [ 1612.390011][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1612.401505][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1612.870007][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1612.875822][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1613.510012][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1613.515804][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1613.521585][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1613.527330][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1613.910017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1613.915780][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:52:42 executing program 1: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 03:52:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1fa}, 0x28) 03:52:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:42 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\x0emy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:42 executing program 4: r0 = timerfd_create(0x0, 0x80800) read(r0, &(0x7f0000000180)=""/49, 0x31) 03:52:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:52:42 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="40000300000000000000000005007c00000000000000280000000000d4e34ba67f6ebd451a22dec4c83108206624ca7a4f9d38e16565a16eb68ca2229428aa5a5282ff43ba0c2b77d868c0757da79288e04d070051f45e6ea42093eb3d7f7746e8eefa7eae21bf460b26bbc86d383a064ea312ba66db4ce4943c4b4d41c97ed370ddb2a3acadc68287b2e940eb689162949f0e102da9edd02e3913d84545"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x408000, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000300)=0x1) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x422000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000140)={r4}) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f0000000040)={r4}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f00000002c0)={r4, 0x0, 0x0, &(0x7f0000000200)=[0x0, 0x9379], 0x80, 0x3, 0x3, &(0x7f0000000240)=[0x0, 0x7ff, 0x7], &(0x7f0000000280)=[0x0, 0xfffffffe, 0x7799fba8, 0x0, 0x100, 0x8, 0x5]}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10) 03:52:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1fb}, 0x28) 03:52:42 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\x0fmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:52:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(r4, 0x4144, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1615.813785][ T4705] kvm: pic: non byte read [ 1615.818787][ T4705] kvm: pic: non byte write [ 1615.824705][ T4705] kvm: pic: non byte read [ 1615.829293][ T4705] kvm: pic: non byte write [ 1615.835629][ T4705] kvm: pic: non byte read [ 1615.840807][ T4705] kvm: pic: non byte write [ 1615.846137][ T4705] kvm: pic: non byte read [ 1615.850918][ T4705] kvm: pic: non byte write [ 1615.856069][ T4705] kvm: pic: non byte read [ 1615.860687][ T4705] kvm: pic: non byte write [ 1615.865813][ T4705] kvm: pic: non byte read [ 1615.870495][ T4705] kvm: pic: non byte write [ 1615.875551][ T4705] kvm: pic: non byte read [ 1615.880191][ T4705] kvm: pic: non byte write [ 1615.885137][ T4705] kvm: pic: non byte read [ 1615.889733][ T4705] kvm: pic: non byte write [ 1615.894992][ T4705] kvm: pic: non byte read [ 1615.899498][ T4705] kvm: pic: non byte write [ 1615.904570][ T4705] kvm: pic: non byte read [ 1615.909544][ T4705] kvm: pic: non byte write [ 1617.670020][ C1] net_ratelimit: 17 callbacks suppressed [ 1617.675688][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1617.681431][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1617.687177][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1617.692913][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1618.070021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1618.070028][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1618.070076][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1618.075813][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1618.630005][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1618.635786][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) r6 = socket(0x9, 0x0, 0x20) getsockopt(r6, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:52:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1fc}, 0x28) 03:52:49 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\x18my\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:49 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:52:49 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x5) 03:52:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x4, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:49 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:52:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1fd}, 0x28) [ 1622.766854][ T4719] picdev_read: 26 callbacks suppressed [ 1622.766867][ T4719] kvm: pic: non byte read [ 1622.789348][ T4719] picdev_write: 26 callbacks suppressed [ 1622.789361][ T4719] kvm: pic: non byte write [ 1622.795276][ C0] net_ratelimit: 20 callbacks suppressed [ 1622.795285][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1622.810948][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:50 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x5) 03:52:50 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1622.828307][ T4719] kvm: pic: non byte read [ 1622.839727][ T4719] kvm: pic: non byte write [ 1622.858521][ T4719] kvm: pic: non byte read 03:52:50 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\x1amy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x1fe}, 0x28) [ 1622.875383][ T4719] kvm: pic: non byte write [ 1622.885922][ T4719] kvm: pic: non byte read [ 1622.900155][ T4719] kvm: pic: non byte write [ 1622.906206][ T4719] kvm: pic: non byte read [ 1622.942680][ T4719] kvm: pic: non byte write [ 1622.963580][ T4719] kvm: pic: non byte read [ 1622.969093][ T4719] kvm: pic: non byte write [ 1622.992248][ T4719] kvm: pic: non byte read [ 1622.999649][ T4719] kvm: pic: non byte write [ 1623.001196][ T4719] kvm: pic: non byte read [ 1623.001822][ T4719] kvm: pic: non byte write [ 1623.002699][ T4719] kvm: pic: non byte read [ 1623.003074][ T4719] kvm: pic: non byte write [ 1623.004074][ T4719] kvm: pic: non byte read [ 1623.004423][ T4719] kvm: pic: non byte write [ 1623.270028][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1623.275855][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1623.910010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1623.915797][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1623.921551][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1623.927258][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1624.310024][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1624.310054][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1628.070036][ C1] net_ratelimit: 15 callbacks suppressed [ 1628.070043][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1628.081559][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1628.087304][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1628.093089][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1628.470001][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1628.470007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1628.470069][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1628.475793][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1629.030001][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1629.035820][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) socket(0x9, 0x0, 0x20) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:52:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x201}, 0x28) 03:52:56 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:52:56 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x6, &(0x7f00000001c0)=[{0x3, 0x7, 0x4, 0x5}, {0x2, 0x0, 0x0, 0x80000000}, {0x0, 0x1, 0x80, 0x4}, {0x81, 0x5, 0x5, 0x1}, {0x0, 0x7, 0x4, 0x8}, {0x4, 0xea, 0x1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) 03:52:56 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\x1bmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x1, 0x0) r4 = gettid() tkill(r4, 0x16) write$cgroup_pid(r3, &(0x7f0000000280)=r4, 0x12) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0xffffffff, 0x80000000000, 0x0, 0x20, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x40], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x202}, 0x28) 03:52:56 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:52:56 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b=my\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:52:56 executing program 4: r0 = open(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0xfffe, 0x2, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) pipe(0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000000c0)={'veth0_to_hsr\x00', {0x2, 0x4e23, @loopback}}) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) 03:52:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x203}, 0x28) 03:52:56 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1633.190004][ C0] net_ratelimit: 21 callbacks suppressed [ 1633.190012][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1633.201959][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1633.679984][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1633.685755][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1634.310004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1634.315765][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1634.321573][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1634.327325][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1634.709997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1634.710023][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) socket(0x9, 0x0, 0x20) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:03 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b>my\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x204}, 0x28) 03:53:03 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:53:03 executing program 4: 03:53:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00', 0x1402}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r4}, 0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000400)={r4, 0x3abc, 0x81, 0x1, 0x4, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000280)={r4, 0x6b, "5bc32fd73749c21d919c90c17bbb902a252dd587e5b56ba7f1866f500cceb0ade656825bd3b741acf2d21685df91a123432e6517707929694fa03c35a01c257a799538c4dfa77bed4f295828b2135d056335bcd339ce80c191b77ba05775ba3ebc590afb953df4765e5894"}, &(0x7f0000000040)=0x73) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:53:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x205}, 0x28) 03:53:03 executing program 4: 03:53:03 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:53:04 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bOmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x206}, 0x28) 03:53:04 executing program 4: [ 1638.469989][ C1] net_ratelimit: 17 callbacks suppressed [ 1638.475679][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1638.481421][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1638.487173][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1638.492909][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1638.869999][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1638.870019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1638.875780][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1639.430002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1639.435777][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1639.910022][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1643.589993][ C0] net_ratelimit: 21 callbacks suppressed [ 1643.590003][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1643.601578][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) socket(0x9, 0x0, 0x20) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:11 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bPmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x4cb], 0x100000}) write(r0, &(0x7f0000000280)="8c6872b88ab9a37983178af213956f97791355da50dbe53a1bc0003e37cd3fba0a42551beeb58c6366f36a573792a7364941982baaaa3b57c71f2e66b98ef042ddc32886177efe9c0765bd23d5957a4f19ccaffd4b533d31010bdf7ae079844c1cf9cff95d01836844a0610f1b9a20529b956455b789c36de14c59a8f3ea7972ab5f7f3f40a287e142db0873cbbe72ecf22103338a80abbf825016cabf844273733eee2ba6b4b2", 0xa7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x207}, 0x28) 03:53:11 executing program 4: 03:53:11 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:53:11 executing program 4: 03:53:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x208}, 0x28) [ 1644.069975][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1644.075761][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:11 executing program 4: 03:53:11 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b[my\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x209}, 0x28) 03:53:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$caif_stream(0x25, 0x1, 0x0) dup2(r0, r1) [ 1644.719967][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1644.725745][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1644.731498][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1644.737219][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1645.109997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1645.110016][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1648.869992][ C1] net_ratelimit: 17 callbacks suppressed [ 1648.869999][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1648.881402][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1648.887131][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1648.892847][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1649.270015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1649.275784][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1649.279967][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1649.287235][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1649.840037][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1649.845851][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = socket(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r3, 0x0) r4 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000280)=0xc) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x20a}, 0x28) 03:53:18 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\x9bmy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:18 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x2) creat(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'ah\x00'}, 0x0) 03:53:18 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:53:18 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x2) creat(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'ah\x00'}, 0x0) 03:53:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x20b}, 0x28) [ 1651.551462][ T4864] picdev_read: 26 callbacks suppressed [ 1651.551469][ T4864] kvm: pic: non byte read [ 1651.567774][ T4864] picdev_write: 26 callbacks suppressed [ 1651.567779][ T4864] kvm: pic: non byte write [ 1651.596287][ T4864] kvm: pic: non byte read 03:53:18 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\ay\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1651.610223][ T4864] kvm: pic: non byte write [ 1651.615099][ T4864] kvm: pic: non byte read [ 1651.626940][ T4864] kvm: pic: non byte write [ 1651.632488][ T4864] kvm: pic: non byte read [ 1651.637137][ T4864] kvm: pic: non byte write [ 1651.646509][ T4864] kvm: pic: non byte read [ 1651.652097][ T4864] kvm: pic: non byte write [ 1651.658522][ T4864] kvm: pic: non byte read [ 1651.671460][ T4864] kvm: pic: non byte write [ 1651.676719][ T4864] kvm: pic: non byte read [ 1651.685612][ T4864] kvm: pic: non byte write [ 1651.691107][ T4864] kvm: pic: non byte read [ 1651.696211][ T4864] kvm: pic: non byte write [ 1651.696495][ T4864] kvm: pic: non byte read [ 1651.705705][ T4864] kvm: pic: non byte write 03:53:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @pic={0x0, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2000, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x0, 0x84) dup3(r4, r5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, 0x0, &(0x7f0000a8a000)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x3a, "c5924bf8546ba4805f04acb8dc4d15cb245c9249f251cb8764c5c66a57203248a2f7fd2b1b1d2d19a03a78aa0fbd36da404ebaf03020af256723"}, &(0x7f0000000340)=0x42) 03:53:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x20c}, 0x28) [ 1651.713055][ T4864] kvm: pic: non byte read [ 1651.713172][ T4864] kvm: pic: non byte write 03:53:18 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\by\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1653.990032][ C0] net_ratelimit: 22 callbacks suppressed [ 1653.995715][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1654.001469][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1654.470065][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1654.475875][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1655.110018][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1655.115824][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1655.121661][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1655.127399][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1655.510003][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1655.510032][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x20d}, 0x28) 03:53:23 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\ty\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:23 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000640)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000080)={0x0, 0x0, 0x8001}) 03:53:23 executing program 2: getsockopt(0xffffffffffffffff, 0x7, 0xfffffffe, &(0x7f0000000440)=""/183, &(0x7f0000000500)=0xb7) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000000380)={@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x1, 0x2, 0x1, 0x4, {0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}}}, {&(0x7f0000000040)=""/59, 0x3b}, &(0x7f0000000340)}, 0xa0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6000000200000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3], 0xf000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r5, 0xffffffffffffffff, 0x80000) setsockopt$bt_BT_FLUSHABLE(r7, 0x112, 0x8, &(0x7f0000000540)=0xffffffff, 0x4) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:53:23 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:53:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x20e}, 0x28) 03:53:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0xc00c) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r2, 0x100000003, 0x804000, 0x28120001) 03:53:23 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\ny\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r6 = dup(r5) ioctl$DMA_BUF_IOCTL_SYNC(r6, 0x40086200, &(0x7f0000000140)=0x1) r7 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r8 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r8, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r10 = dup(r9) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r10}) ioctl$DRM_IOCTL_GEM_CLOSE(r7, 0x40086409, &(0x7f0000000100)={r11, 0x7000000}) ioctl$DRM_IOCTL_ADD_MAP(r7, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x3b, 0x0, 0x10, &(0x7f0000ffc000/0x1000)=nil}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r6}) dup(0xffffffffffffffff) 03:53:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x20f}, 0x28) 03:53:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x4cb], 0x100000}) write(r0, &(0x7f0000000280)="8c6872b88ab9a37983178af213956f97791355da50dbe53a1bc0003e37cd3fba0a42551beeb58c6366f36a573792a7364941982baaaa3b57c71f2e66b98ef042ddc32886177efe9c0765bd23d5957a4f19ccaffd4b533d31010bdf7ae079844c1cf9cff95d01836844a0610f1b9a20529b956455b789c36de14c59a8f3ea7972ab5f7f3f40a287e142db0873cbbe72ecf22103338a80abbf825016cabf844273733eee2ba6b4b2", 0xa7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1656.532991][ T4925] ion_buffer_destroy: buffer still mapped in the kernel [ 1659.270017][ C1] net_ratelimit: 17 callbacks suppressed [ 1659.275731][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1659.281449][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1659.287171][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1659.292916][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1659.670002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1659.670043][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1659.675762][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1660.230034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1660.235857][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1660.710019][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:53:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:30 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\fy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x210}, 0x28) 03:53:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x4cb], 0x100000}) write(r0, &(0x7f0000000280)="8c6872b88ab9a37983178af213956f97791355da50dbe53a1bc0003e37cd3fba0a42551beeb58c6366f36a573792a7364941982baaaa3b57c71f2e66b98ef042ddc32886177efe9c0765bd23d5957a4f19ccaffd4b533d31010bdf7ae079844c1cf9cff95d01836844a0610f1b9a20529b956455b789c36de14c59a8f3ea7972ab5f7f3f40a287e142db0873cbbe72ecf22103338a80abbf825016cabf844273733eee2ba6b4b2", 0xa7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x80000, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:30 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:53:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x4cb], 0x100000}) write(r0, &(0x7f0000000280)="8c6872b88ab9a37983178af213956f97791355da50dbe53a1bc0003e37cd3fba0a42551beeb58c6366f36a573792a7364941982baaaa3b57c71f2e66b98ef042ddc32886177efe9c0765bd23d5957a4f19ccaffd4b533d31010bdf7ae079844c1cf9cff95d01836844a0610f1b9a20529b956455b789c36de14c59a8f3ea7972ab5f7f3f40a287e142db0873cbbe72ecf22103338a80abbf825016cabf844273733eee2ba6b4b2", 0xa7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x211}, 0x28) [ 1662.931823][ T4948] picdev_read: 62 callbacks suppressed [ 1662.931846][ T4948] kvm: pic: non byte read [ 1662.946232][ T4948] picdev_write: 62 callbacks suppressed [ 1662.946246][ T4948] kvm: pic: non byte write [ 1662.979421][ T4948] kvm: pic: non byte read [ 1662.990448][ T4948] kvm: pic: non byte write [ 1663.003791][ T4948] kvm: pic: non byte read [ 1663.016144][ T4948] kvm: pic: non byte write 03:53:30 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\ry\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:30 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 1663.044774][ T4948] kvm: pic: non byte read [ 1663.052446][ T4948] kvm: pic: non byte write [ 1663.059931][ T4948] kvm: pic: non byte read [ 1663.084753][ T4948] kvm: pic: non byte write 03:53:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x212}, 0x28) [ 1663.094546][ T4948] kvm: pic: non byte read [ 1663.123179][ T4948] kvm: pic: non byte write [ 1663.143842][ T4948] kvm: pic: non byte read 03:53:30 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\x0ey\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1663.167755][ T4948] kvm: pic: non byte write [ 1663.175789][ T4948] kvm: pic: non byte read [ 1663.180832][ T4948] kvm: pic: non byte write [ 1663.187492][ T4948] kvm: pic: non byte read [ 1663.195397][ T4948] kvm: pic: non byte write [ 1663.208583][ T4948] kvm: pic: non byte read [ 1663.219699][ T4948] kvm: pic: non byte write [ 1663.375814][ T4975] kvm: pic: single mode not supported [ 1663.376150][ T4975] kvm: pic: single mode not supported [ 1663.381899][ T4975] kvm: pic: single mode not supported [ 1663.387611][ T4975] kvm: pic: single mode not supported [ 1663.393846][ T4975] kvm: pic: single mode not supported [ 1663.399597][ T4975] kvm: pic: single mode not supported [ 1664.390021][ C0] net_ratelimit: 20 callbacks suppressed [ 1664.401079][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1664.406814][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1664.870035][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1664.875841][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1665.510001][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1665.515786][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1665.521549][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1665.527273][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1665.910017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1665.910036][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.670041][ C1] net_ratelimit: 18 callbacks suppressed [ 1669.670052][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.681510][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1669.687327][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.693056][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1670.070009][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1670.070027][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1670.075796][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x213}, 0x28) 03:53:37 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\x0fy\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000003c40)='9\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000340)={0x9f0000, 0x101, 0x2, [], &(0x7f0000000300)={0x990970, 0x3f, [], @ptr=0xb0d}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) r4 = fsopen(&(0x7f0000000040)='dax\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x1, &(0x7f0000000280)='\x00', &(0x7f00000002c0)='/dev/kvm\x00', 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x10001, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x1], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000029c0)={0xffffffffffffffff}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f0000000140)={0x10000, 0x6, 0x1000}) process_vm_writev(0x0, &(0x7f0000000440)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000380)=""/178, 0xb2}, {&(0x7f0000001540)=""/92, 0x5c}, {&(0x7f00000015c0)=""/173, 0xad}], 0x4, &(0x7f0000003bc0)=[{&(0x7f0000001680)=""/164, 0xa4}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/233, 0xe9}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000002840)=""/240, 0xf0}, {&(0x7f0000002940)=""/104, 0x68}, {&(0x7f0000003a80)=""/167, 0xa7}, {&(0x7f0000003b40)=""/120, 0x78}], 0x8, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000002a00)=[@in6={0xa, 0x4e23, 0x4, @remote}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, @in6={0xa, 0x4e21, 0xfff, @mcast1, 0x10000}, @in6={0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000000}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x74) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:53:37 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:53:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x80000, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x80, 0x0) ioctl$USBDEVFS_GETDRIVER(r4, 0x41045508, &(0x7f0000000340)={0xa0, "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"}) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f00000001c0)={0x79}) getsockopt$bt_sco_SCO_CONNINFO(r4, 0x11, 0x2, &(0x7f0000000540)=""/183, &(0x7f0000000600)=0xb7) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000280)={[0x8001, 0x3, 0xad2, 0x951, 0x5, 0x20, 0x9, 0x7, 0xcb22, 0x10000, 0x819, 0x9, 0x401, 0x5, 0x100000000, 0xd62], 0x4001, 0x20000}) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 03:53:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x214}, 0x28) 03:53:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x80000, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:37 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\x18y\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x215}, 0x28) 03:53:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x80000, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1670.618019][ T5000] picdev_read: 62 callbacks suppressed [ 1670.618034][ T5000] kvm: pic: non byte read [ 1670.629963][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1670.635736][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1670.636882][ T5000] picdev_write: 62 callbacks suppressed [ 1670.636898][ T5000] kvm: pic: non byte write [ 1670.660401][ T5000] kvm: pic: non byte read [ 1670.665317][ T5000] kvm: pic: non byte write [ 1670.673615][ T5000] kvm: pic: single mode not supported [ 1670.673668][ T5000] kvm: pic: level sensitive irq not supported [ 1670.679694][ T5000] kvm: pic: non byte read [ 1670.693949][ T5000] kvm: pic: non byte write [ 1670.700421][ T5000] kvm: pic: single mode not supported [ 1670.700449][ T5000] kvm: pic: level sensitive irq not supported [ 1670.711497][ T5000] kvm: pic: non byte read [ 1670.726561][ T5000] kvm: pic: non byte write [ 1670.731781][ T5000] kvm: pic: single mode not supported [ 1670.731799][ T5000] kvm: pic: level sensitive irq not supported [ 1670.737885][ T5000] kvm: pic: non byte read [ 1670.750528][ T5000] kvm: pic: non byte write [ 1670.755605][ T5000] kvm: pic: single mode not supported [ 1670.755614][ T5000] kvm: pic: level sensitive irq not supported [ 1670.761798][ T5000] kvm: pic: non byte read [ 1670.772815][ T5000] kvm: pic: non byte write [ 1670.777927][ T5000] kvm: pic: single mode not supported [ 1670.777951][ T5000] kvm: pic: level sensitive irq not supported [ 1670.783963][ T5000] kvm: pic: non byte read [ 1670.794883][ T5000] kvm: pic: non byte write [ 1670.799695][ T5000] kvm: pic: single mode not supported [ 1670.799701][ T5000] kvm: pic: level sensitive irq not supported [ 1670.805507][ T5000] kvm: pic: non byte read [ 1670.816121][ T5000] kvm: pic: non byte write [ 1670.821304][ T5000] kvm: pic: single mode not supported [ 1670.821316][ T5000] kvm: pic: level sensitive irq not supported [ 1670.826874][ T5000] kvm: pic: non byte read [ 1670.837567][ T5000] kvm: pic: non byte write [ 1670.842416][ T5000] kvm: pic: single mode not supported [ 1670.842426][ T5000] kvm: pic: level sensitive irq not supported [ 1670.848133][ T5000] kvm: pic: non byte read [ 1670.858874][ T5000] kvm: pic: non byte write [ 1670.863756][ T5000] kvm: pic: single mode not supported [ 1670.863763][ T5000] kvm: pic: level sensitive irq not supported [ 1670.869975][ T5000] kvm: pic: single mode not supported [ 1670.876210][ T5000] kvm: pic: level sensitive irq not supported [ 1671.119996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1674.789985][ C0] net_ratelimit: 21 callbacks suppressed [ 1674.789994][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1674.801592][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1675.270010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1675.275774][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1675.909979][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1675.915760][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1675.921530][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1675.927342][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1676.310055][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1676.310113][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:53:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) msgget$private(0x0, 0x200) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000300)=0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0xffffffffffffffff, &(0x7f0000000280)=[{0x3, 0x80, 0x1000}, {0x4, 0xcca, 0x1800}, {0xb67ae4c6de5dd8e0, 0x9}], 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x1}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x200, 0x40) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:53:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x216}, 0x28) 03:53:44 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\x1ay\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:44 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:53:44 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "11e1c3537fc6b51f69d012523142d5e0be78cb9e8098ddf2e83af1d971e527b09c99044836d1c618d9e63f6ffeb249c91d42edb15d06ccacfef68442472eea", 0x3e}, 0x60) 03:53:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22", 0xc2}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x217}, 0x28) 03:53:44 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\x1by\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1677.057668][ T5029] picdev_read: 55 callbacks suppressed [ 1677.057674][ T5029] kvm: pic: non byte read [ 1677.090754][ T5029] kvm: pic: non byte read 03:53:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x218}, 0x28) [ 1677.109254][ T5029] picdev_write: 55 callbacks suppressed [ 1677.109291][ T5029] kvm: pic: non byte write [ 1677.133294][ T5029] kvm: pic: non byte read [ 1677.148179][ T5029] kvm: pic: non byte write 03:53:44 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4c, 0x0, 0x4) 03:53:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/70, 0x342}, {0x0}, {0x0}, {0x0}, {0x0}], 0x3}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r1, 0x0) [ 1680.070012][ C1] net_ratelimit: 17 callbacks suppressed [ 1680.075701][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1680.081479][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1680.087303][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1680.093043][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1680.470047][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1680.470073][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1680.475849][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1681.029986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1681.035750][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1681.509983][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:53:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:51 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<;y\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x219}, 0x28) 03:53:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x420080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000040)}, 0x20000, 0x0, 0x5}, 0x0, 0xc, r2, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, &(0x7f00000001c0)={{0x2, @addr=0x4}, 0x8, 0x8, 0x8}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:53:51 executing program 4: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0xbaa) perf_event_open(0x0, r0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r1 = syz_open_procfs(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='io\x00') faccessat(r1, &(0x7f0000000000)='./bus\x00', 0x1, 0x100) read$FUSE(r2, 0x0, 0x0) write$FUSE_POLL(r2, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/netfilter\x00') sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000300)=0x5b11, 0x4) ftruncate(r4, 0x80006) sendfile(r3, r4, 0x0, 0x8000fffffffe) 03:53:51 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:53:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x21a}, 0x28) [ 1684.337431][ T5073] kvm: pic: non byte read [ 1684.343791][ T5073] kvm: pic: non byte write [ 1684.352965][ T5073] kvm: pic: non byte read [ 1684.363046][ T5073] kvm: pic: non byte write [ 1684.373502][ T5073] kvm: pic: non byte read [ 1684.382175][ T5073] kvm: pic: non byte write 03:53:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000000)={0x0, 0xfffffd0d, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x1, 0x7, 0x1, 0x0, 0x0, {0x0, 0xf0ffff}, [@typed={0x8, 0x100000001, @pid}]}, 0x1c}}, 0x0) [ 1684.387890][ T5073] kvm: pic: non byte read [ 1684.392705][ T5073] kvm: pic: non byte write [ 1684.397515][ T5073] kvm: pic: non byte read [ 1684.402250][ T5073] kvm: pic: non byte write 03:53:51 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1684.428417][ T5073] kvm: pic: non byte read [ 1684.433184][ T5073] kvm: pic: non byte write [ 1684.438005][ T5073] kvm: pic: non byte read [ 1684.443988][ T5073] kvm: pic: non byte write [ 1684.448884][ T5073] kvm: pic: non byte read [ 1684.453623][ T5073] kvm: pic: non byte write [ 1684.458486][ T5073] kvm: pic: non byte read [ 1684.465345][ T5073] kvm: pic: non byte write [ 1684.470801][ T5073] kvm: pic: non byte read [ 1684.476137][ T5073] kvm: pic: non byte write 03:53:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x21b}, 0x28) 03:53:51 executing program 4: r0 = socket(0x2, 0x6, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000000eff4)) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x0) 03:53:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) io_setup(0x5, &(0x7f0000000000)=0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) io_submit(r4, 0x2, &(0x7f0000001340)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r6, &(0x7f0000000140)}]) io_pgetevents(r4, 0x3, 0x4, &(0x7f0000000280)=[{}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000340)={&(0x7f0000000300)={0x8}, 0x8}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1685.190001][ C0] net_ratelimit: 21 callbacks suppressed [ 1685.190010][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1685.201432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1685.670023][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1685.675849][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1686.310039][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1686.315863][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1686.321619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1686.327358][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1686.710011][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1686.710033][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:53:56 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x21c}, 0x28) 03:53:56 executing program 4: 03:53:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000040)={0x2, 0x86}, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, 0x0) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f0000000280)="c7fa24157b22726414386edea3512f812590c2653885aba502371c1ede8382b223a2300a58fd6caba2f78561512843269ae03dd9c700fb95b670f019b79af1b23e57ac9cb615657601f4d2ccd551b09edb930623da3c23b55cfae2b26e7362bb2a4aea7bdc69ade5e9a8121e5707d6ab677dfa844974513e3b703e6f9df285693456dc50626049c6787f97c046726035573c0a783e222e595f3764a6bbae9efc51da3822b3cb661ddb35f2da38e464f4e64022671edf99a2c13998035218130ba163beb8c067721b9dfbe4993058b1223912c88c1129f0") 03:53:56 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:53:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x21d}, 0x28) 03:53:56 executing program 4: 03:53:56 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:53:56 executing program 4: 03:53:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$l2tp(0x18, 0x1, 0x1) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe5b, 0x0, 0x0, 0xc6, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2={0x2000000, [{0x8, 0x137e}, {0x7, 0x1}]}, 0x14, 0x2) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0], 0x1, 0x81, 0x3c, 0x9, 0x8, 0x9, {0x4b95a4e9, 0x59c, 0x1, 0x3, 0x4, 0x7ff, 0xfffe, 0x9, 0x8, 0x6, 0x2b0f, 0x3, 0xf5, 0xffffffff, "ccdc760ff7f0a1549cdb2c87da4e4e30eaabab12ada270c1cc45abfa63d0db2a"}}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x21e}, 0x28) [ 1690.470031][ C1] net_ratelimit: 17 callbacks suppressed [ 1690.475735][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1690.481537][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1690.487353][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1690.493101][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1690.870046][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1690.870052][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1690.870113][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1690.875864][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1691.430089][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1691.436577][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1695.590038][ C0] net_ratelimit: 22 callbacks suppressed [ 1695.590046][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1695.601640][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:54:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:54:03 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:03 executing program 4: 03:54:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x21f}, 0x28) 03:54:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_GET_SECCOMP(0x15) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000380)={0x7, &(0x7f0000000280)=[{0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}]}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r5, r4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e23, @rand_addr=0xffffffff}], 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:54:03 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 03:54:03 executing program 4: 03:54:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x220}, 0x28) 03:54:03 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) [ 1696.069984][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1696.075801][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:03 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b<\x9by\xeaU\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:03 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000440)="b9", 0x1) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 03:54:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x221}, 0x28) [ 1696.710010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1696.715829][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1696.721605][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1696.727373][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1697.109992][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1697.110015][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1700.869992][ C1] net_ratelimit: 17 callbacks suppressed [ 1700.869999][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1700.881441][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1700.887191][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1700.892925][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1701.269999][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1701.270022][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1701.275774][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1701.840001][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1701.845794][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1702.310016][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:54:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:54:10 executing program 4: 03:54:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x222}, 0x28) 03:54:10 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 03:54:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0x8) getpeername(r2, &(0x7f0000000280)=@ax25={{0x3, @bcast}, [@null, @rose, @default, @bcast, @null, @netrom, @null, @default]}, &(0x7f0000000040)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @ioapic={0x6000, 0x81, 0x6, 0xff, 0x0, [{0x0, 0x1, 0x3, [], 0x3}, {0x0, 0x8, 0xa1, [], 0x81}, {0x81, 0x0, 0x80, [], 0xb7}, {0x2, 0x80, 0x80, [], 0x5}, {0x1f, 0x2, 0x14, [], 0x6}, {0x8, 0x7, 0x1f, [], 0xb1}, {0x20, 0x3f, 0x14, [], 0x2}, {0x1f, 0x4, 0x40, [], 0x40}, {0x2, 0xdf, 0xda, [], 0x20}, {0x7f, 0x9, 0x47, [], 0x3}, {0x63, 0x4, 0x0, [], 0x3}, {0x6e, 0x8, 0x3, [], 0x6}, {0x97, 0x8b, 0x0, [], 0x9}, {0xff, 0x75, 0x7, [], 0x9}, {0x4, 0x7f, 0x0, [], 0x6}, {0x87, 0xd9, 0x7f, [], 0x30}, {0x0, 0x6f, 0x1, [], 0x80}, {0x6, 0x6, 0x3, [], 0x20}, {0x2, 0x81, 0x3, [], 0xff}, {0x1, 0x1, 0x98, [], 0x40}, {0x1, 0x80, 0x9, [], 0x1f}, {0x3, 0xfd, 0x9, [], 0x8}, {0x81, 0x1, 0x3, [], 0x3f}, {0x9, 0x40, 0x8, [], 0x80}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:54:10 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:10 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 03:54:10 executing program 4: 03:54:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x223}, 0x28) [ 1703.539429][ T5187] picdev_read: 26 callbacks suppressed [ 1703.539442][ T5187] kvm: pic: non byte read [ 1703.560332][ T5187] picdev_write: 26 callbacks suppressed [ 1703.560357][ T5187] kvm: pic: non byte write [ 1703.581980][ T5187] kvm: pic: non byte read 03:54:10 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 03:54:10 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1703.586757][ T5187] kvm: pic: non byte write [ 1703.600737][ T5187] kvm: pic: non byte read 03:54:10 executing program 4: [ 1703.642822][ T5187] kvm: pic: non byte write [ 1703.648267][ T5187] kvm: pic: non byte read [ 1703.656006][ T5187] kvm: pic: non byte write [ 1703.693760][ T5187] kvm: pic: non byte read [ 1703.698344][ T5187] kvm: pic: non byte write [ 1703.721538][ T5187] kvm: pic: non byte read [ 1703.734588][ T5187] kvm: pic: non byte write [ 1703.755641][ T5187] kvm: pic: non byte read [ 1703.774175][ T5187] kvm: pic: non byte write [ 1703.779763][ T5187] kvm: pic: non byte read [ 1703.784850][ T5187] kvm: pic: non byte write [ 1703.796926][ T5187] kvm: pic: non byte read [ 1703.801727][ T5187] kvm: pic: non byte write [ 1703.814766][ T5187] kvm: pic: non byte read [ 1703.819304][ T5187] kvm: pic: non byte write [ 1705.990024][ C0] net_ratelimit: 21 callbacks suppressed [ 1705.995812][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1706.001566][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1706.469977][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1706.475776][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1707.110039][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1707.115847][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1707.121597][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1707.127329][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1707.510027][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1707.510048][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1711.280007][ C1] net_ratelimit: 17 callbacks suppressed [ 1711.280017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1711.291491][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1711.297261][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1711.303024][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1711.670041][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1711.675818][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1711.679996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1711.687273][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:54:19 executing program 4: 03:54:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x224}, 0x28) 03:54:19 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 03:54:19 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x16) r3 = gettid() tkill(r3, 0x16) perf_event_open(0x0, r3, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r6, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r6, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r7 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r7, r6) r8 = accept(r6, &(0x7f0000000280)=@un=@abs, &(0x7f0000000040)=0x80) getsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:54:19 executing program 4: 03:54:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x225}, 0x28) 03:54:19 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 03:54:19 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1712.229989][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1712.235804][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:54:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x226}, 0x28) 03:54:19 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9", 0x1) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) [ 1716.389990][ C0] net_ratelimit: 20 callbacks suppressed [ 1716.390004][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1716.401456][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1716.869986][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1716.875778][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1717.509988][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1717.515819][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1717.521572][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1717.527331][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1717.909983][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1717.915780][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:54:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:54:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x227}, 0x28) 03:54:25 executing program 4: 03:54:25 executing program 1: 03:54:25 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose}, [@default, @remote, @rose, @rose, @netrom, @remote, @default, @netrom]}, &(0x7f0000000040)=0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0xc6b62f7844c40895, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x1000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x11, 0x4, 0x9) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:54:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x40000000000015d, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='\x00\a\x00\x00\x81z\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xda\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-\x86\xcf\xa5\xed\xc8RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\xb0v\v\xde\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7\xd0\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\xccl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xb7\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc\x9fJ\xc1Z\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xb9\x03v\x8d+\xc7\x90U\xd8\x9aP \x92\xf6/\xe1\xcd\x02 \x0f\xffx5\x92\xb2&\x8e\xf6\xd5\x17\xe4\xf6b\x9aw\xca\xf26\xb0n\xef\xa6\x19\xa7/3s\xf4\xda\xb3\xb5Fl\xdco\xca\x00\x00\x00Mxa\xfcD\xa03\xf7\"?Z\x84\xf9\x9es\x10\xb4\xaa\x10Z\x0f0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f00000000c0)=0x400001, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) 03:54:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x228}, 0x28) 03:54:26 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x229}, 0x28) 03:54:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r4, r3) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f0000000040)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1719.498876][ T5282] picdev_read: 6 callbacks suppressed [ 1719.498886][ T5282] kvm: pic: non byte read [ 1719.509049][ T5282] picdev_write: 6 callbacks suppressed [ 1719.509058][ T5282] kvm: pic: non byte write [ 1719.519709][ T5282] kvm: pic: non byte read [ 1719.524486][ T5282] kvm: pic: non byte write [ 1719.529466][ T5282] kvm: pic: non byte read [ 1719.534167][ T5282] kvm: pic: non byte write [ 1719.539385][ T5282] kvm: pic: non byte read [ 1719.544054][ T5282] kvm: pic: non byte write [ 1721.670001][ C1] net_ratelimit: 18 callbacks suppressed [ 1721.670020][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1721.681426][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1721.687186][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1721.692947][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1722.070000][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1722.070019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1722.075799][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1722.630024][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1722.635817][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1723.109984][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:54:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:54:32 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000180)=""/179, 0xb3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = dup(r1) shutdown(0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000040)={0x80}, 0x10) accept(r0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xd324, 0x0, 0x0, 0x800e0053f) shutdown(r2, 0x0) 03:54:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x22a}, 0x28) 03:54:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r3, &(0x7f0000000040), 0x8) listen(r3, 0x0) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x8) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:54:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x40000000000015d, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='\x00\a\x00\x00\x81z\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xda\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-\x86\xcf\xa5\xed\xc8RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\xb0v\v\xde\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7\xd0\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\xccl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xb7\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc\x9fJ\xc1Z\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xb9\x03v\x8d+\xc7\x90U\xd8\x9aP \x92\xf6/\xe1\xcd\x02 \x0f\xffx5\x92\xb2&\x8e\xf6\xd5\x17\xe4\xf6b\x9aw\xca\xf26\xb0n\xef\xa6\x19\xa7/3s\xf4\xda\xb3\xb5Fl\xdco\xca\x00\x00\x00Mxa\xfcD\xa03\xf7\"?Z\x84\xf9\x9es\x10\xb4\xaa\x10Z\x0f0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x40000000000015d, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='\x00\a\x00\x00\x81z\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xda\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-\x86\xcf\xa5\xed\xc8RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\xb0v\v\xde\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7\xd0\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\xccl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xb7\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc\x9fJ\xc1Z\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xb9\x03v\x8d+\xc7\x90U\xd8\x9aP \x92\xf6/\xe1\xcd\x02 \x0f\xffx5\x92\xb2&\x8e\xf6\xd5\x17\xe4\xf6b\x9aw\xca\xf26\xb0n\xef\xa6\x19\xa7/3s\xf4\xda\xb3\xb5Fl\xdco\xca\x00\x00\x00Mxa\xfcD\xa03\xf7\"?Z\x84\xf9\x9es\x10\xb4\xaa\x10Z\x0f a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 f3 a4 [ 1726.350300][ T5327] RSP: 0000:ffffc90002847bc0 EFLAGS: 00010206 [ 1726.356361][ T5327] RAX: 0000000000040000 RBX: 0000000000001000 RCX: 0000000000000500 [ 1726.364333][ T5327] RDX: 0000000000001000 RSI: ffff888067535b00 RDI: 000000002064c000 [ 1726.372577][ T5327] RBP: ffffc90002847bf8 R08: ffff88806ad05040 R09: 000088806ad05b58 [ 1726.380717][ T5327] R10: 0000000000000001 R11: 000088806ad05b5f R12: 000000002064b500 [ 1726.388691][ T5327] R13: 000000002064c500 R14: 0000000000000000 R15: 00007ffffffff000 [ 1726.396733][ T5327] ? copyout+0xa5/0xb0 [ 1726.400809][ T5327] copy_page_to_iter+0x254/0x8b0 [ 1726.405806][ T5327] pipe_to_user+0x71/0xc0 [ 1726.410134][ T5327] __splice_from_pipe+0x248/0x480 [ 1726.415155][ T5327] ? iter_to_pipe+0x3f0/0x3f0 [ 1726.419846][ T5327] do_vmsplice.part.0+0x1c5/0x210 [ 1726.424877][ T5327] __do_sys_vmsplice+0x15f/0x1c0 [ 1726.429828][ T5327] ? __read_once_size+0x5a/0xe0 [ 1726.434744][ T5327] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1726.440469][ T5327] ? _copy_to_user+0x84/0xb0 [ 1726.445064][ T5327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1726.451312][ T5327] ? put_timespec64+0x94/0xc0 [ 1726.456093][ T5327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1726.462335][ T5327] __x64_sys_vmsplice+0x5e/0x80 [ 1726.467191][ T5327] do_syscall_64+0xcc/0x370 [ 1726.471822][ T5327] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1726.477785][ T5327] RIP: 0033:0x45a6f9 [ 1726.481690][ T5327] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1726.501458][ T5327] RSP: 002b:00007f7815719c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 1726.509870][ T5327] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a6f9 [ 1726.517998][ T5327] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000006 [ 1726.525968][ T5327] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1726.533979][ T5327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f781571a6d4 03:54:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x22e}, 0x28) [ 1726.541952][ T5327] R13: 00000000004cb1bf R14: 00000000004e4978 R15: 00000000ffffffff [ 1726.550248][ T5327] memory: usage 307200kB, limit 307200kB, failcnt 3604 [ 1726.557202][ T5327] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1726.564118][ T5327] Memory cgroup stats for /syz4: [ 1726.564402][ T5327] anon 281595904 [ 1726.564402][ T5327] file 2543616 [ 1726.564402][ T5327] kernel_stack 4202496 [ 1726.564402][ T5327] slab 5509120 [ 1726.564402][ T5327] sock 0 [ 1726.564402][ T5327] shmem 2424832 [ 1726.564402][ T5327] file_mapped 0 [ 1726.564402][ T5327] file_dirty 135168 [ 1726.564402][ T5327] file_writeback 0 [ 1726.564402][ T5327] anon_thp 262144000 [ 1726.564402][ T5327] inactive_anon 2433024 [ 1726.564402][ T5327] active_anon 281595904 [ 1726.564402][ T5327] inactive_file 0 [ 1726.564402][ T5327] active_file 32768 [ 1726.564402][ T5327] unevictable 0 [ 1726.564402][ T5327] slab_reclaimable 675840 [ 1726.564402][ T5327] slab_unreclaimable 4833280 [ 1726.564402][ T5327] pgfault 103488 [ 1726.564402][ T5327] pgmajfault 0 [ 1726.564402][ T5327] workingset_refault 363 [ 1726.564402][ T5327] workingset_activate 0 [ 1726.564402][ T5327] workingset_nodereclaim 0 [ 1726.564402][ T5327] pgrefill 832 [ 1726.564402][ T5327] pgscan 9690 [ 1726.564402][ T5327] pgsteal 6001 [ 1726.660656][ T5327] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9713,uid=0 [ 1726.676107][ T5327] Memory cgroup out of memory: Killed process 9713 (syz-executor.4) total-vm:72580kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1726.775977][ T1070] oom_reaper: reaped process 9713 (syz-executor.4), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1726.789969][ C0] net_ratelimit: 20 callbacks suppressed [ 1726.789977][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1726.801393][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1727.270072][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1727.276127][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1727.910052][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1727.915880][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1727.921812][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1727.927553][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1728.630057][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1728.630076][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1732.069987][ C1] net_ratelimit: 17 callbacks suppressed [ 1732.069997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1732.081570][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1732.087342][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1732.093238][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1732.790029][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1732.790036][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1732.790066][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1732.795833][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:54:40 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x40000000000015d, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='\x00\a\x00\x00\x81z\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xda\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-\x86\xcf\xa5\xed\xc8RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\xb0v\v\xde\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7\xd0\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\xccl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xb7\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc\x9fJ\xc1Z\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xb9\x03v\x8d+\xc7\x90U\xd8\x9aP \x92\xf6/\xe1\xcd\x02 \x0f\xffx5\x92\xb2&\x8e\xf6\xd5\x17\xe4\xf6b\x9aw\xca\xf26\xb0n\xef\xa6\x19\xa7/3s\xf4\xda\xb3\xb5Fl\xdco\xca\x00\x00\x00Mxa\xfcD\xa03\xf7\"?Z\x84\xf9\x9es\x10\xb4\xaa\x10Z\x0f0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:54:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x22f}, 0x28) 03:54:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x40000000000015d, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='\x00\a\x00\x00\x81z\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xda\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-\x86\xcf\xa5\xed\xc8RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\xb0v\v\xde\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7\xd0\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\xccl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xb7\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc\x9fJ\xc1Z\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xb9\x03v\x8d+\xc7\x90U\xd8\x9aP \x92\xf6/\xe1\xcd\x02 \x0f\xffx5\x92\xb2&\x8e\xf6\xd5\x17\xe4\xf6b\x9aw\xca\xf26\xb0n\xef\xa6\x19\xa7/3s\xf4\xda\xb3\xb5Fl\xdco\xca\x00\x00\x00Mxa\xfcD\xa03\xf7\"?Z\x84\xf9\x9es\x10\xb4\xaa\x10Z\x0f0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1733.225279][ T5367] syz-executor.4 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1733.236378][ T5367] CPU: 1 PID: 5367 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1733.244634][ T5367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1733.254752][ T5367] Call Trace: [ 1733.258143][ T5367] dump_stack+0x11d/0x181 [ 1733.262523][ T5367] dump_header+0xaa/0x449 [ 1733.267085][ T5367] oom_kill_process.cold+0x10/0x15 [ 1733.272281][ T5367] out_of_memory+0x231/0xa00 [ 1733.276882][ T5367] mem_cgroup_out_of_memory+0x128/0x150 [ 1733.282435][ T5367] try_charge+0xb5c/0xbe0 [ 1733.286829][ T5367] ? __rcu_read_unlock+0x10/0x3c0 [ 1733.291916][ T5367] mem_cgroup_try_charge+0xd2/0x260 [ 1733.297165][ T5367] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1733.302805][ T5367] shmem_getpage_gfp+0x3bf/0x1390 [ 1733.307902][ T5367] shmem_write_begin+0x9f/0x140 [ 1733.312811][ T5367] generic_perform_write+0x136/0x320 [ 1733.318158][ T5367] __generic_file_write_iter+0x251/0x380 [ 1733.323973][ T5367] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 1733.330546][ T5367] generic_file_write_iter+0x28c/0x390 [ 1733.336020][ T5367] new_sync_write+0x388/0x4a0 [ 1733.340761][ T5367] __vfs_write+0xb1/0xc0 [ 1733.345005][ T5367] vfs_write+0x18a/0x390 [ 1733.349247][ T5367] ksys_write+0xd5/0x1b0 [ 1733.353491][ T5367] __x64_sys_write+0x4c/0x60 [ 1733.358085][ T5367] do_syscall_64+0xcc/0x370 [ 1733.362721][ T5367] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1733.368669][ T5367] RIP: 0033:0x45a6f9 [ 1733.372578][ T5367] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1733.392218][ T5367] RSP: 002b:00007f78156d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1733.400630][ T5367] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 1733.408605][ T5367] RDX: 00000000ffffff76 RSI: 0000000020000000 RDI: 0000000000000009 [ 1733.416662][ T5367] RBP: 000000000075c1c0 R08: 0000000000000000 R09: 0000000000000000 [ 1733.424684][ T5367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f78156d86d4 [ 1733.432657][ T5367] R13: 00000000004cbde0 R14: 00000000004e5b00 R15: 00000000ffffffff [ 1733.441532][ T5367] memory: usage 307200kB, limit 307200kB, failcnt 3944 [ 1733.448387][ T5367] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1733.455302][ T5367] Memory cgroup stats for /syz4: [ 1733.455442][ T5367] anon 283357184 [ 1733.455442][ T5367] file 1064960 [ 1733.455442][ T5367] kernel_stack 4202496 [ 1733.455442][ T5367] slab 5509120 [ 1733.455442][ T5367] sock 0 [ 1733.455442][ T5367] shmem 958464 [ 1733.455442][ T5367] file_mapped 0 [ 1733.455442][ T5367] file_dirty 135168 [ 1733.455442][ T5367] file_writeback 0 [ 1733.455442][ T5367] anon_thp 264241152 [ 1733.455442][ T5367] inactive_anon 946176 [ 1733.455442][ T5367] active_anon 283357184 [ 1733.455442][ T5367] inactive_file 0 [ 1733.455442][ T5367] active_file 32768 [ 1733.455442][ T5367] unevictable 0 [ 1733.455442][ T5367] slab_reclaimable 675840 [ 1733.455442][ T5367] slab_unreclaimable 4833280 [ 1733.455442][ T5367] pgfault 103587 [ 1733.455442][ T5367] pgmajfault 0 [ 1733.455442][ T5367] workingset_refault 363 [ 1733.455442][ T5367] workingset_activate 0 [ 1733.455442][ T5367] workingset_nodereclaim 0 [ 1733.455442][ T5367] pgrefill 832 [ 1733.455442][ T5367] pgscan 9723 [ 1733.455442][ T5367] pgsteal 6034 [ 1733.554310][ T5367] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9568,uid=0 [ 1733.570156][ T5367] Memory cgroup out of memory: Killed process 9568 (syz-executor.4) total-vm:72712kB, anon-rss:2200kB, file-rss:35780kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1733.590131][ T5357] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 1733.602032][ T5357] CPU: 0 PID: 5357 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1733.610329][ T5357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1733.620426][ T5357] Call Trace: [ 1733.623729][ T5357] dump_stack+0x11d/0x181 [ 1733.628070][ T5357] dump_header+0xaa/0x449 [ 1733.632442][ T5357] oom_kill_process.cold+0x10/0x15 [ 1733.637892][ T5357] out_of_memory+0x231/0xa00 [ 1733.642615][ T5357] mem_cgroup_out_of_memory+0x128/0x150 [ 1733.648170][ T5357] try_charge+0x7f5/0xbe0 [ 1733.652631][ T5357] ? __rcu_read_unlock+0x66/0x3c0 [ 1733.657828][ T5357] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 1733.663346][ T5357] __memcg_kmem_charge+0xde/0x240 [ 1733.668396][ T5357] __alloc_pages_nodemask+0x26c/0x310 [ 1733.674156][ T5357] alloc_pages_current+0xd1/0x170 [ 1733.679209][ T5357] pte_alloc_one+0x18/0x50 [ 1733.683752][ T5357] do_huge_pmd_anonymous_page+0x861/0xfe0 [ 1733.689545][ T5357] __handle_mm_fault+0x1aca/0x2c70 [ 1733.694711][ T5357] handle_mm_fault+0x21b/0x530 [ 1733.699549][ T5357] __do_page_fault+0x456/0x8d0 [ 1733.704370][ T5357] ? cgroup_rstat_updated+0xbe/0x1e0 [ 1733.709842][ T5357] do_page_fault+0x38/0x194 [ 1733.714426][ T5357] page_fault+0x34/0x40 [ 1733.718586][ T5357] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x30 [ 1733.725187][ T5357] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 f3 a4 [ 1733.744992][ T5357] RSP: 0018:ffffc9000277fbf0 EFLAGS: 00010206 [ 1733.751245][ T5357] RAX: 0000000000040000 RBX: 0000000000001000 RCX: 0000000000000340 [ 1733.759250][ T5357] RDX: 0000000000001000 RSI: 0000000020a00000 RDI: ffff8880735cfcc0 [ 1733.767299][ T5357] RBP: ffffc9000277fc28 R08: ffff88806ad05040 R09: 000088806ad05b58 [ 1733.775436][ T5357] R10: 0000000000000001 R11: 000088806ad05b5f R12: 00000000209ff340 [ 1733.783475][ T5357] R13: 0000000020a00340 R14: 0000000000000000 R15: 00007ffffffff000 [ 1733.791483][ T5357] ? copyin+0xa5/0xb0 [ 1733.795474][ T5357] copy_page_from_iter+0x23f/0x5f0 [ 1733.800666][ T5357] pipe_write+0x17b/0x970 [ 1733.805016][ T5357] new_sync_write+0x388/0x4a0 [ 1733.809853][ T5357] __vfs_write+0xb1/0xc0 [ 1733.814171][ T5357] vfs_write+0x18a/0x390 [ 1733.818445][ T5357] ksys_write+0xd5/0x1b0 [ 1733.822810][ T5357] __x64_sys_write+0x4c/0x60 [ 1733.827411][ T5357] do_syscall_64+0xcc/0x370 [ 1733.831984][ T5357] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1733.837879][ T5357] RIP: 0033:0x45a6f9 [ 1733.841865][ T5357] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1733.861492][ T5357] RSP: 002b:00007f781573ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1733.869906][ T5357] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 1733.878745][ T5357] RDX: 0000000041395527 RSI: 0000000020000340 RDI: 0000000000000007 [ 1733.886714][ T5357] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1733.894768][ T5357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f781573b6d4 [ 1733.902810][ T5357] R13: 00000000004c79e9 R14: 00000000004e49f0 R15: 00000000ffffffff [ 1733.911114][ T5357] memory: usage 307200kB, limit 307200kB, failcnt 3952 [ 1733.917962][ T5357] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1733.924838][ T5357] Memory cgroup stats for /syz4: [ 1733.924971][ T5357] anon 283357184 [ 1733.924971][ T5357] file 1064960 [ 1733.924971][ T5357] kernel_stack 4202496 [ 1733.924971][ T5357] slab 5509120 [ 1733.924971][ T5357] sock 0 [ 1733.924971][ T5357] shmem 958464 [ 1733.924971][ T5357] file_mapped 0 [ 1733.924971][ T5357] file_dirty 135168 [ 1733.924971][ T5357] file_writeback 0 [ 1733.924971][ T5357] anon_thp 264241152 [ 1733.924971][ T5357] inactive_anon 946176 [ 1733.924971][ T5357] active_anon 283357184 [ 1733.924971][ T5357] inactive_file 0 [ 1733.924971][ T5357] active_file 32768 [ 1733.924971][ T5357] unevictable 0 [ 1733.924971][ T5357] slab_reclaimable 675840 [ 1733.924971][ T5357] slab_unreclaimable 4833280 [ 1733.924971][ T5357] pgfault 103587 [ 1733.924971][ T5357] pgmajfault 0 [ 1733.924971][ T5357] workingset_refault 363 [ 1733.924971][ T5357] workingset_activate 0 [ 1733.924971][ T5357] workingset_nodereclaim 0 [ 1733.924971][ T5357] pgrefill 832 [ 1733.924971][ T5357] pgscan 9756 [ 1733.924971][ T5357] pgsteal 6034 [ 1734.020321][ T5357] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9419,uid=0 [ 1734.035948][ T5357] Memory cgroup out of memory: Killed process 9419 (syz-executor.4) total-vm:72580kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1734.979921][ C0] sched: RT throttling activated [ 1734.980874][ T1070] oom_reaper: reaped process 9419 (syz-executor.4), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 03:54:42 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x40000000000015d, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='\x00\a\x00\x00\x81z\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xda\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-\x86\xcf\xa5\xed\xc8RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\xb0v\v\xde\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7\xd0\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\xccl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xb7\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc\x9fJ\xc1Z\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xb9\x03v\x8d+\xc7\x90U\xd8\x9aP \x92\xf6/\xe1\xcd\x02 \x0f\xffx5\x92\xb2&\x8e\xf6\xd5\x17\xe4\xf6b\x9aw\xca\xf26\xb0n\xef\xa6\x19\xa7/3s\xf4\xda\xb3\xb5Fl\xdco\xca\x00\x00\x00Mxa\xfcD\xa03\xf7\"?Z\x84\xf9\x9es\x10\xb4\xaa\x10Z\x0f0xffffffffffffffff}, 0xc00) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r8, 0x4008ae48, &(0x7f00000009c0)=0x3000) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r9}, 0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000400)={r9, 0x3abc, 0x81, 0x1, 0x4, 0x8}, 0x14) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000280)={r9, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000300)={r10, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f00000003c0)=0x84) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r11, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:54:42 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1737.190007][ C0] net_ratelimit: 22 callbacks suppressed [ 1737.190014][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1737.201598][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1737.670035][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1737.675835][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1738.310027][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1738.315807][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1738.321628][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1738.327495][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1739.029995][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1739.030002][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1742.470008][ C1] net_ratelimit: 17 callbacks suppressed [ 1742.470015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1742.481452][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1742.487189][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1742.492962][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:54:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x232}, 0x28) 03:54:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x40000000000015d, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r4, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='\x00\a\x00\x00\x81z\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xda\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-\x86\xcf\xa5\xed\xc8RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\xb0v\v\xde\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7\xd0\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\xccl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xb7\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc\x9fJ\xc1Z\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xb9\x03v\x8d+\xc7\x90U\xd8\x9aP \x92\xf6/\xe1\xcd\x02 \x0f\xffx5\x92\xb2&\x8e\xf6\xd5\x17\xe4\xf6b\x9aw\xca\xf26\xb0n\xef\xa6\x19\xa7/3s\xf4\xda\xb3\xb5Fl\xdco\xca\x00\x00\x00Mxa\xfcD\xa03\xf7\"?Z\x84\xf9\x9es\x10\xb4\xaa\x10Z\x0f0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x6, @remote, 0x7d5}], 0x1c) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r6, 0x8070ae9f, 0x0) name_to_handle_at(r6, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0xb7, 0xf3, "eb993fc6974b7768bffd2d4fed71e14315822d0992603b34229fbfad875dbd1fda92681f0bc57b2b7d0630ecbb8bda86dab93c085cc3262d144a8fc93fadfded53cc6085687b1c1d29490313d43c71be60245a2c910482d2d5f564d4ab035e3a759f203aa8434197aebccd034f37bd4ead20198ebaf81d20c5cba7e211871c63c7ef4da1394786984101fd582156a74542a1d8bec2e52aee8ac14ae357f6c1add864be1a9404a20f813b2629387c8a"}, &(0x7f00000003c0), 0x1000) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:54:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r5, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, 0x0, 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:54:49 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:54:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x233}, 0x28) [ 1742.854096][ T5427] syz-executor.4 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1742.865302][ T5427] CPU: 0 PID: 5427 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1742.873520][ T5427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1742.883559][ T5427] Call Trace: [ 1742.886866][ T5427] dump_stack+0x11d/0x181 [ 1742.891238][ T5427] dump_header+0xaa/0x449 [ 1742.895562][ T5427] oom_kill_process.cold+0x10/0x15 [ 1742.900722][ T5427] out_of_memory+0x231/0xa00 [ 1742.905326][ T5427] mem_cgroup_out_of_memory+0x128/0x150 [ 1742.910912][ T5427] try_charge+0xb5c/0xbe0 [ 1742.915252][ T5427] ? __rcu_read_unlock+0x10/0x3c0 [ 1742.920307][ T5427] mem_cgroup_try_charge+0xd2/0x260 [ 1742.925508][ T5427] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1742.931145][ T5427] shmem_getpage_gfp+0x3bf/0x1390 [ 1742.936188][ T5427] shmem_write_begin+0x9f/0x140 [ 1742.941108][ T5427] generic_perform_write+0x136/0x320 [ 1742.946402][ T5427] __generic_file_write_iter+0x251/0x380 [ 1742.952039][ T5427] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 1742.958542][ T5427] generic_file_write_iter+0x28c/0x390 [ 1742.963999][ T5427] new_sync_write+0x388/0x4a0 [ 1742.968673][ T5427] __vfs_write+0xb1/0xc0 [ 1742.972954][ T5427] vfs_write+0x18a/0x390 [ 1742.977194][ T5427] ksys_write+0xd5/0x1b0 [ 1742.981525][ T5427] __x64_sys_write+0x4c/0x60 [ 1742.986172][ T5427] do_syscall_64+0xcc/0x370 [ 1742.990675][ T5427] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1742.996560][ T5427] RIP: 0033:0x45a6f9 [ 1743.000508][ T5427] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1743.020102][ T5427] RSP: 002b:00007f78156d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1743.028545][ T5427] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 1743.036512][ T5427] RDX: 00000000ffffff76 RSI: 0000000020000000 RDI: 0000000000000009 [ 1743.044533][ T5427] RBP: 000000000075c1c0 R08: 0000000000000000 R09: 0000000000000000 [ 1743.052600][ T5427] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f78156d86d4 [ 1743.060568][ T5427] R13: 00000000004cbde0 R14: 00000000004e5b00 R15: 00000000ffffffff [ 1743.068681][ T5427] memory: usage 307200kB, limit 307200kB, failcnt 9551 [ 1743.075561][ T5427] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1743.082466][ T5427] Memory cgroup stats for /syz4: [ 1743.082652][ T5427] anon 283217920 [ 1743.082652][ T5427] file 1441792 [ 1743.082652][ T5427] kernel_stack 4165632 [ 1743.082652][ T5427] slab 5509120 [ 1743.082652][ T5427] sock 0 [ 1743.082652][ T5427] shmem 1470464 [ 1743.082652][ T5427] file_mapped 0 [ 1743.082652][ T5427] file_dirty 135168 [ 1743.082652][ T5427] file_writeback 0 [ 1743.082652][ T5427] anon_thp 264241152 [ 1743.082652][ T5427] inactive_anon 1351680 [ 1743.082652][ T5427] active_anon 283217920 [ 1743.082652][ T5427] inactive_file 0 [ 1743.082652][ T5427] active_file 0 [ 1743.082652][ T5427] unevictable 0 [ 1743.082652][ T5427] slab_reclaimable 675840 [ 1743.082652][ T5427] slab_unreclaimable 4833280 [ 1743.082652][ T5427] pgfault 103785 [ 1743.082652][ T5427] pgmajfault 0 [ 1743.082652][ T5427] workingset_refault 363 [ 1743.082652][ T5427] workingset_activate 0 [ 1743.082652][ T5427] workingset_nodereclaim 0 [ 1743.082652][ T5427] pgrefill 6377 [ 1743.082652][ T5427] pgscan 15272 [ 1743.082652][ T5427] pgsteal 6034 [ 1743.177047][ T5427] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9399,uid=0 [ 1743.192523][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1743.192556][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1743.199960][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1743.204054][ T5427] Memory cgroup out of memory: Killed process 9399 (syz-executor.4) total-vm:72580kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1743.209721][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1743.430006][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1743.435803][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1744.580822][ T1070] oom_reaper: reaped process 9399 (syz-executor.4), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1744.644554][ T5423] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 03:54:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0xfff7fffffffffffc, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x14}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r4, 0x3}}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 1744.644574][ T5423] CPU: 1 PID: 5423 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1744.644643][ T5423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:54:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x234}, 0x28) [ 1744.644648][ T5423] Call Trace: [ 1744.644675][ T5423] dump_stack+0x11d/0x181 03:54:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) [ 1744.644734][ T5423] dump_header+0xaa/0x449 [ 1744.644752][ T5423] oom_kill_process.cold+0x10/0x15 [ 1744.644770][ T5423] out_of_memory+0x231/0xa00 [ 1744.644793][ T5423] mem_cgroup_out_of_memory+0x128/0x150 [ 1744.644814][ T5423] try_charge+0xb5c/0xbe0 [ 1744.644833][ T5423] ? __rcu_read_unlock+0x10/0x3c0 [ 1744.644901][ T5423] mem_cgroup_try_charge+0xd2/0x260 [ 1744.644963][ T5423] mem_cgroup_try_charge_delay+0x3a/0x80 03:54:53 executing program 4: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000500)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000002c0)='./file0/file0\x00', r2, &(0x7f0000000180)='./file0/file0\x00') renameat2(r2, &(0x7f0000000100)='./file0/file0\x00', r2, &(0x7f0000000000)='./file0\x00', 0x0) [ 1744.644982][ T5423] wp_page_copy+0x322/0x1120 [ 1744.645006][ T5423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1744.645021][ T5423] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1744.645039][ T5423] do_wp_page+0x192/0x11f0 [ 1744.645052][ T5423] ? osq_unlock+0x45/0x120 [ 1744.645121][ T5423] ? rwsem_mark_wake+0x69/0x4b0 [ 1744.645175][ T5423] __handle_mm_fault+0x1ab1/0x2c70 [ 1744.645202][ T5423] handle_mm_fault+0x21b/0x530 [ 1744.645223][ T5423] __do_page_fault+0x456/0x8d0 [ 1744.645238][ T5423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1744.645292][ T5423] do_page_fault+0x38/0x194 [ 1744.645310][ T5423] page_fault+0x34/0x40 [ 1744.645326][ T5423] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x30 [ 1744.645344][ T5423] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 f3 a4 [ 1744.645352][ T5423] RSP: 0018:ffffc90002807bc0 EFLAGS: 00010206 [ 1744.645364][ T5423] RAX: 0000000000040000 RBX: 0000000000001000 RCX: 0000000000000500 [ 1744.645373][ T5423] RDX: 0000000000001000 RSI: ffff88806e760b00 RDI: 0000000020ec5000 [ 1744.645478][ T5423] RBP: ffffc90002807bf8 R08: ffff8881225f40c0 R09: 00008881225f4bd8 [ 1744.645487][ T5423] R10: 0000000000000001 R11: 00008881225f4bdf R12: 0000000020ec4500 [ 1744.645496][ T5423] R13: 0000000020ec5500 R14: 0000000000000000 R15: 00007ffffffff000 [ 1744.645519][ T5423] ? copyout+0xa5/0xb0 [ 1744.645535][ T5423] copy_page_to_iter+0x254/0x8b0 [ 1744.645561][ T5423] pipe_to_user+0x71/0xc0 [ 1744.645615][ T5423] __splice_from_pipe+0x248/0x480 [ 1744.645628][ T5423] ? iter_to_pipe+0x3f0/0x3f0 [ 1744.645673][ T5423] do_vmsplice.part.0+0x1c5/0x210 [ 1744.645692][ T5423] __do_sys_vmsplice+0x15f/0x1c0 [ 1744.645713][ T5423] ? __read_once_size+0x5a/0xe0 [ 1744.645728][ T5423] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1744.645743][ T5423] ? _copy_to_user+0x84/0xb0 [ 1744.645807][ T5423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1744.645820][ T5423] ? put_timespec64+0x94/0xc0 [ 1744.645836][ T5423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1744.645851][ T5423] __x64_sys_vmsplice+0x5e/0x80 [ 1744.645870][ T5423] do_syscall_64+0xcc/0x370 [ 1744.645946][ T5423] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1744.645956][ T5423] RIP: 0033:0x45a6f9 [ 1744.645974][ T5423] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1744.645981][ T5423] RSP: 002b:00007f7815719c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 1744.645995][ T5423] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a6f9 [ 1744.646003][ T5423] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000006 [ 1744.646011][ T5423] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1744.646090][ T5423] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f781571a6d4 [ 1744.646098][ T5423] R13: 00000000004cb1bf R14: 00000000004e4978 R15: 00000000ffffffff [ 1744.646117][ T5423] memory: usage 307200kB, limit 307200kB, failcnt 15840 [ 1744.646125][ T5423] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1744.646128][ T5423] Memory cgroup stats for /syz4: [ 1744.646385][ T5423] anon 281559040 [ 1744.646385][ T5423] file 3063808 [ 1744.646385][ T5423] kernel_stack 4165632 [ 1744.646385][ T5423] slab 5509120 [ 1744.646385][ T5423] sock 0 [ 1744.646385][ T5423] shmem 3092480 [ 1744.646385][ T5423] file_mapped 0 [ 1744.646385][ T5423] file_dirty 135168 [ 1744.646385][ T5423] file_writeback 0 [ 1744.646385][ T5423] anon_thp 262144000 [ 1744.646385][ T5423] inactive_anon 3108864 [ 1744.646385][ T5423] active_anon 281559040 [ 1744.646385][ T5423] inactive_file 0 [ 1744.646385][ T5423] active_file 32768 [ 1744.646385][ T5423] unevictable 0 [ 1744.646385][ T5423] slab_reclaimable 675840 [ 1744.646385][ T5423] slab_unreclaimable 4833280 [ 1744.646385][ T5423] pgfault 103917 [ 1744.646385][ T5423] pgmajfault 0 [ 1744.646385][ T5423] workingset_refault 363 [ 1744.646385][ T5423] workingset_activate 0 [ 1744.646385][ T5423] workingset_nodereclaim 0 [ 1744.646385][ T5423] pgrefill 12582 [ 1744.646385][ T5423] pgscan 21449 [ 1744.646385][ T5423] pgsteal 6034 [ 1744.646393][ T5423] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9388,uid=0 [ 1744.646504][ T5423] Memory cgroup out of memory: Killed process 9388 (syz-executor.4) total-vm:72580kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1745.606317][ T1070] oom_reaper: reaped process 9388 (syz-executor.4), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1745.790689][ T5435] picdev_read: 26 callbacks suppressed [ 1745.790696][ T5435] kvm: pic: non byte read [ 1745.790876][ T5435] picdev_write: 26 callbacks suppressed [ 1745.790881][ T5435] kvm: pic: non byte write [ 1745.791149][ T5435] kvm: pic: non byte read [ 1745.791211][ T5435] kvm: pic: non byte write [ 1745.791501][ T5435] kvm: pic: non byte read [ 1745.791575][ T5435] kvm: pic: non byte write [ 1745.791831][ T5435] kvm: pic: non byte read [ 1745.791896][ T5435] kvm: pic: non byte write [ 1745.808518][ T5435] kvm: pic: non byte read [ 1745.808586][ T5435] kvm: pic: non byte write [ 1745.808835][ T5435] kvm: pic: non byte read [ 1745.808907][ T5435] kvm: pic: non byte write [ 1745.809179][ T5435] kvm: pic: non byte read [ 1745.809325][ T5435] kvm: pic: non byte write [ 1745.809571][ T5435] kvm: pic: non byte read [ 1745.809633][ T5435] kvm: pic: non byte write [ 1745.809889][ T5435] kvm: pic: non byte read [ 1745.823634][ T5435] kvm: pic: non byte write [ 1745.823899][ T5435] kvm: pic: non byte read [ 1745.824048][ T5435] kvm: pic: non byte write [ 1745.987044][ T5447] overlayfs: conflicting lowerdir path [ 1746.042369][ T5447] overlayfs: unrecognized mount option "./file0/file0" or missing value [ 1747.589990][ C0] net_ratelimit: 22 callbacks suppressed [ 1747.589997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1747.601390][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1748.710030][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1748.715845][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1748.721681][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1748.727412][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1748.733170][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1748.738907][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1749.430014][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1749.430034][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:55:00 executing program 1: 03:55:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x235}, 0x28) 03:55:00 executing program 4: 03:55:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x52dc, 0x4}, 0x10000, 0x20000000000, 0x0, 0x4, 0x6, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in, @in6=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000280)=0x4) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, 0x0) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:55:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) accept(r0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:55:00 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1752.870017][ C1] net_ratelimit: 15 callbacks suppressed [ 1752.875725][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1752.881448][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1752.887225][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1752.892976][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1752.900161][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1752.905901][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:55:00 executing program 4: [ 1753.079528][ T5457] picdev_read: 62 callbacks suppressed [ 1753.079535][ T5457] kvm: pic: non byte read [ 1753.079635][ T5457] picdev_write: 62 callbacks suppressed [ 1753.079638][ T5457] kvm: pic: non byte write [ 1753.081372][ T5457] kvm: pic: non byte read [ 1753.081438][ T5457] kvm: pic: non byte write [ 1753.081672][ T5457] kvm: pic: non byte read [ 1753.081735][ T5457] kvm: pic: non byte write [ 1753.081991][ T5457] kvm: pic: non byte read [ 1753.082055][ T5457] kvm: pic: non byte write 03:55:00 executing program 4: 03:55:00 executing program 1: 03:55:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x236}, 0x28) [ 1753.083482][ T5457] kvm: pic: non byte read [ 1753.150187][ T5457] kvm: pic: non byte write [ 1753.155099][ T5457] kvm: pic: non byte read 03:55:00 executing program 1: 03:55:00 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1753.191229][ T5457] kvm: pic: non byte write [ 1753.207403][ T5457] kvm: pic: non byte read [ 1753.219341][ T5457] kvm: pic: non byte write 03:55:00 executing program 4: [ 1753.255549][ T5457] kvm: pic: non byte read [ 1753.263500][ T5457] kvm: pic: non byte write [ 1753.268985][ T5457] kvm: pic: non byte read [ 1753.292232][ T5457] kvm: pic: non byte write 03:55:00 executing program 1: 03:55:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x237}, 0x28) [ 1753.304738][ T5457] kvm: pic: non byte read [ 1753.320186][ T5457] kvm: pic: non byte write 03:55:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1753.589988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1753.590028][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1753.595796][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1753.830010][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1757.989970][ C0] net_ratelimit: 21 callbacks suppressed [ 1757.989985][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1758.001384][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1759.109982][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1759.115753][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1759.121589][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1759.127318][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1759.133115][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1759.138853][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1759.830013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1759.835805][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:55:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) accept(r0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:55:07 executing program 4: 03:55:07 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:07 executing program 1: 03:55:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x238}, 0x28) 03:55:07 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000300)='/dev/capi20\x00', 0x101100, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r6, r5) recvfrom$inet(r5, &(0x7f0000000280)=""/78, 0x4e, 0x62, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) 03:55:07 executing program 4: 03:55:07 executing program 1: 03:55:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x239}, 0x28) [ 1760.548840][ T5502] picdev_read: 62 callbacks suppressed [ 1760.548855][ T5502] kvm: pic: non byte read [ 1760.569016][ T5502] picdev_write: 62 callbacks suppressed [ 1760.569031][ T5502] kvm: pic: non byte write [ 1760.584055][ T5502] kvm: pic: non byte read [ 1760.588716][ T5502] kvm: pic: non byte write 03:55:07 executing program 1: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7fffffd}) socket(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004300)=[{{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, 0x0}}], 0x31e, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 03:55:07 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1760.620080][ T5502] pic_ioport_write: 49 callbacks suppressed [ 1760.620096][ T5502] kvm: pic: single mode not supported [ 1760.620753][ T5502] kvm: pic: non byte read [ 1760.650832][ T5502] kvm: pic: non byte write [ 1760.677846][ T5502] kvm: pic: non byte read [ 1760.690551][ T5502] kvm: pic: non byte write [ 1760.696159][ T5502] kvm: pic: non byte read [ 1760.722977][ T5502] kvm: pic: non byte write [ 1760.731589][ T5502] kvm: pic: non byte read [ 1760.744994][ T5502] kvm: pic: non byte write [ 1760.751899][ T5502] kvm: pic: non byte read [ 1760.763251][ T5502] kvm: pic: non byte write [ 1760.768646][ T5502] kvm: pic: non byte read [ 1760.784851][ T5502] kvm: pic: non byte write [ 1760.795899][ T5502] kvm: pic: non byte read [ 1760.811358][ T5502] kvm: pic: non byte write [ 1760.821638][ T5502] kvm: pic: non byte read [ 1760.838998][ T5502] kvm: pic: non byte write [ 1760.888795][ T5502] kvm: pic: single mode not supported [ 1760.927140][ T5502] pic_ioport_write: 47 callbacks suppressed [ 1760.927153][ T5502] kvm: pic: level sensitive irq not supported [ 1763.270031][ C1] net_ratelimit: 15 callbacks suppressed [ 1763.281749][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1763.287533][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1763.293295][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1763.299079][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1763.304887][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1763.310634][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1763.989985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1763.989991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1763.990027][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1763.995809][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:55:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) accept(r0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:55:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x23a}, 0x28) 03:55:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000180)=""/179, 0xb3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = dup(r1) accept(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xd324, 0x0, 0x0, 0x800e0053f) shutdown(r2, 0x0) 03:55:14 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getuid() recvfrom$inet(r0, 0x0, 0x100000007, 0x0, 0x0, 0x800e006c0) shutdown(r0, 0x0) 03:55:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x7, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:55:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x23b}, 0x28) [ 1767.177901][ T5546] picdev_read: 55 callbacks suppressed [ 1767.177916][ T5546] kvm: pic: non byte read [ 1767.192856][ T5546] picdev_write: 57 callbacks suppressed [ 1767.192874][ T5546] kvm: pic: non byte write 03:55:14 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x23c}, 0x28) [ 1767.220599][ T5546] kvm: pic: non byte read [ 1767.225333][ T5546] kvm: pic: non byte write [ 1767.233683][ T5546] kvm: pic: non byte read [ 1767.238493][ T5546] kvm: pic: non byte write [ 1767.244211][ T5546] kvm: pic: non byte read [ 1767.250169][ T5546] kvm: pic: non byte write [ 1767.255599][ T5546] kvm: pic: non byte read [ 1767.273431][ T5546] kvm: pic: non byte write [ 1767.290297][ T5546] kvm: pic: non byte read [ 1767.311088][ T5546] kvm: pic: non byte write 03:55:14 executing program 1: syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@logbsize={'logbsize', 0x3d, [0x33]}}]}) 03:55:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0xfff7fffffffffffc, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x14}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r4, 0x3}}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 1767.328257][ T5546] kvm: pic: non byte read [ 1767.340309][ T5546] kvm: pic: non byte write [ 1767.345985][ T5546] kvm: pic: non byte read 03:55:14 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1767.375233][ T5546] kvm: pic: non byte write [ 1767.397015][ T5546] kvm: pic: non byte read [ 1767.402070][ T5546] kvm: pic: non byte write [ 1767.408324][ T5546] kvm: pic: non byte read [ 1767.413323][ T5546] kvm: pic: non byte write [ 1768.390000][ C0] net_ratelimit: 23 callbacks suppressed [ 1768.395694][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1768.401416][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1769.510030][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1769.515822][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1769.521589][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1769.527324][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1769.533084][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1769.538830][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1770.230008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1770.230015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1773.670035][ C1] net_ratelimit: 16 callbacks suppressed [ 1773.675752][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1773.681550][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1773.687318][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1773.693090][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1773.698871][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1773.704750][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:55:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:55:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x23d}, 0x28) 03:55:21 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0xfff7fffffffffffc, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x14}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r4, 0x3}}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:55:21 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000007500000075000000040000001000000004000006040000000500000007000000080000000800000006000000040000000a000000050000000a0500000f0100000004000000080000000200000003000000040000000400000004080000ff7f0000f07f000005000000020000000400000005000000060000009bf50000f200"/148], &(0x7f0000000040)=""/62, 0x94, 0x3e}, 0x20) pwritev(r4, &(0x7f0000001580)=[{&(0x7f0000000380)="8ce98dd32cbc130d662a1685ac4a20a68734f015891275799d5d", 0x1a}, {&(0x7f00000003c0)="107423cd7de21feebfb93db630567315536b4237e76c0739664bd7824efa09", 0x1f}, {&(0x7f0000000540)="ebb98661b2addfbf2221f5303475fc330f91a5fdd23247dbb0fb3728662641d5f10dff335af532cf6cb35770a4e7ac06b3bbb89a0c41db017753fc77d9c315c5d74db6dfa8e48a3b82d52638ffe59d58106e0aad105ea5c5f6ab35f01d62a9ed1eaabca8fa346b8f8a440e6d478ced7881484ca2440a74efaf112967de39e64974f5d77ff47f0fad14cc71321af75acf6a89bb1a1529df70ed1fd276919cd84b44483a659d811a648e50817aa0f1834bde40a00f965d871b7eb590acf01481eba70202a5aed387bb96e20f98d23bfa480d0864caa09fdc56d073573b52ce2295573856a6a063844b56c7a4f10d04669c6b32afb7150901f179377583213ed4c9d7e950b76737c255beb6c2ccd4c1836fa7928c54c1e84795f5c6bfe2b511269af652d5952f0ebc0cbbcf96d2b5d574d22943556a382f97e8a00a9f355c6c9c82887b32227fa0f895d5771c4a8140482d0062a39cd1ad085d9de3d6047b54cdea87b14cb53134f81ba5e921bb6bd7852cb96ad2969cfae09706fc95d32181021e15c07a7b6f5e05f6c89c601314a139244a054bc62261d6cd66f43a49169dbe0ba05cccfd968abae828429e7e23508b787b1a33ab23b5c2cbcccadd9f3e84325677f4c8045826c25b08955e775ee9e6cdbcd32bd184a4aafebfbb6f9538ec65dc8376564735442cc8959325ddfad6c28bf7f0022f44f9bcc838918614da08fc7971ef28d9e408fc83e005a06cb60739520d1693c2e8957d2102424c876ef7679dfb901f60817dfc55fb20dc458fff32cc222a42ea1f418336a919f6b2f2c64a979fa7257558f7e9d49fd061134bb0d8deb96fe7395ce5eccf1824712605a0ce33e687c4564ab06d2a7e93140a7a7888dd7c2dae1fe87910a817dc1287e1adad773ab99d2c8bcec94d4b5e6c39bbce87b5dace5b87bc4b607c4ac5133ad72967107200e4f3abac9c59a28d2c3a2fb3f5ce7aaa0add5c3c50b1945e32bbe0cd3daa2338c32edf8e444d10da37242b2bfdb49ec3970c0ecd16716c32fc3db145325bc3945220509352beca31ed898d92bbcf653f916b7014b519e8670ab67ad22206d432559fb15f5e4a18ba0b27055e53dbb911febe376c237a3871b2918037f3e1550fbb42967051140312da1ec2693f75a65f5bc0ff5dd4cdc9535b2e13b195890478d1e24ea48ddafd4e0a03b75863b5ca4e5f3a7f59e9630b145482511f79afc80a264f701f3baa86dbf145e8880f75c573db853e924562f13e75c91ca0127e2f51c3de2ea585cc78aeafc85d567fd7ba8f23d65c22b76a58eb94c9a6575010310cf1da27b5e136f36710957b1f566872159db5a1b30a3a3c7991a88ffc9e7d7fc6603c115458f59bb51a9e9266f9f714f5ce5f28c0264b49a5ad59a52e4a1375193e066b14c4de0dcc4510deea697c600f5b75812761b8b3057b04264b9e5c2c323d27f62bfdde5c86e62e07054b9e2107dd7955732a2a15f65949ab38b4cbcf811557e5f9c72b1097e8117a6705b0b480e03fe6406e10cf73a7120b2845c3ebfca790052b256960ef305605d53d8c7906a815dc0a6cc56b8462e50cb3d2d4a5f22844437bdcc968ac800b8a8b7186c55ccc0fe4ed413dedd363603d50250a06e5d35c033be84183cd8304c84e6c35a8723ce21fb2db2fe56e60a18fa7ee1f7ee0047ccd45f7563bbafedf797e360a8018464dc01384f95a658e163549523def376be8660edd88cd50830b2017d91aab2ee649b522fd70d2ae3dfc4b3fdd34b0b221592ef20d71a9b6de69272de425e1d0a1fb52cb900ea421071d3a46fbdc7d450306211e800445e040aab71c1a1907370f996446dc923c8f41c6fb45af6fd6e535bc089ac03a044d1b8575a9ec538e668e2424fb6a335d0dd49956acc3c94407a131d339fe3941bdfd35a5c7f8ab027d6717a5ba450ed16aa5ab2927dc11bfcfa659743a55858077ab6843608e8be6a3b15fb066f6153a1a3d01437e6cc696819e627f3601454fc7f225c97dc6cb6a61a6d2b9d709b194dffc97b65dd770ad79558a87ad8dd97df07117faf25db86ddd1b83d6b7a8026a903c50fef22eff14a767b76cfbbe0bd54bab769f45bf18b0cbbdaa7bac71cec7421aa0ab3395096c6e0c15ee3aee751e81769b52ca1698c3d3887e7ce55c665d3d7f84c0783d1532d2aac8b033028375b5b7823c91ae6ef11bfba4b92b58bc7dd788cfa7569a9adf677320eebc3c7848572dd42cf43cc464a4455d7d2ee50adfb2a6c1b3c0bc626dcd6df938e8da7800a31eb384c02924d99f7c235834f2b23ebcc12481442325dd40a45d43a298a194b798adb074c5fd189c48fbcc9f646a7bd9c057a0f82b5e0cfcfb9759779106ad232bb769492e214777c085a2ed47d1b8f7dafd4e0f40b1c811f1abfddf4169a0c535016cf3ea5176568f3194f472f85de0d57ecbccc602ab96225effb38111afeb9bc7db7079f45be0b64ca4ae38abde38abe8c7c54fc5fe8327c0e563edf49c4b47e2ee17683e7ca8502cc7ca6ad3e47f23054241ea9578c85056c3733b97205b1df803f782bd2e781f6adc352d5ce903cbedcc8fce9da55c0461b297b4260d00e3a9e7817145c8c6b12843eb2d0e26865379140a28ed7686fe73508ba08fc0be1bceee98e59d320ec9bfc5c9f67f9a07c158f97f9ca769dca69d41d93838927e6779419b5d2a5cecd909a41f34d530d67e93f260e39be34e5950958dda69b7965f35008d4bbac59b201f92c4aaef1481bc81642c127328e9a993bea126898eb62c80c446ba432e3029966643ed12d446705e284805a9201daf046ce979f36f094918de5a58ada65cf6d2c4f6c8bc2cececde4548371075f9433583a6f38873d05e75658d91ba26a455e198ef1482d398e2fe40c68816b8d133d8d954a3e7c356971df89ffa5873934c260d6c76a6275dac1beb31f69664962f8c659a4002a8947a6a328ba87e6862067f0d24657b6927a18fdc7c8addb3d4dba06331614b909d21a6442ba2ecc1fe047a59acf1fecd3f43dc462cad186fddd679f3c84c6c34518afeeaa8ed8dc364805fc99a96b50f1b4e0ecfdb363d92cf0dc8c6e0977d2d5eaaaa882f25484028acd67f7a97ba1c5e5813f6bcf0b987339559086d3dab93323541428e50eb13a50c02c8b15365464fdaaec5e76b9883d38e6c39fee482ca6df321d3ed461e4668187ca4d153f5cc3061ea1109b865a9a1f44f4956fd76df57a4562774697f87357ee523ca78ac7f4ecdac84a63f59cc175053c1d958b54808994ef12b17ff6c4803c7cc4c4d01c899d462eabfa2a5ee95f14cd98f7d2591c324878c652551771be2d43a9e461e3b537c42308250a7029023ece2fb1902c7b10a90a745bb07860401a36acd0545cbb3a363e82ec01bb51154c8ee9444115aea3746d3c9eadb918f48b3af2024366f003f568db84693eac7c633f67dc1a3b6f3c4358f4020fe0443f851b3f3efbe0380d7beb5b11d9bcf3e9bfc61200a5778372c46abdb5a23c750f25b22ffecd7b2548b2ec0de35bac8b9434edb01e9e5e4adc91c492212c8855ddd328c6ed415584801e682b789296c9fb9ad0a7e3a0b8c2c6661785cc37d00c9c18614f44511f79cd909823ae7916831c93d874a530662acce91f33fea6e89f5aeb696afec2dfbb967c297f7d5371c1c4c6fb1453fbd0a11b2b2bc426c4802e468b642a24ba9127ea16acfc3759a4bba51657b2e27baee99c8e2d0c13d764b5772bbdbf77eec9aa9af4b562f5b73d8b9dcdaf70eb5c99b62d19b03e28634ae01376234643a6c6e06062377ca604e71c11bae4df022cccaea6b71e13637aff6f146d3585cf92acb5882a1b21a1ed4d3dfe35b83153f7f5b24271be9579dde9ad4b9f4a9521ed796bb14737358f4c9019ecae6236f6b21293c5275d6ae6bf81e49180ce971b7f90033bb98f77f60a4979325a31324eb017302f38916a7ffc95219753928a2385769e43f5c1e68164bb19523caf4519fd9442cdd1c97d326fa37743392eedab099563d5a93795fd76d421762e8b47a32b79befdb3ab0de151ba03499f041053a0cee6bfbc3bb75a715eaf634b20c3f182b01b7d4c9df3942fdd0caa07530f3daa708bc464c890f1a098e9baa349534acc7f534f8a1776e2ec8bbdc81a826450f7d626fc4bc5aa58874caa04d11f2b28acc2f938e92889c1cd76a5495564d940e5e20472c9bf431de393f19dd28cf715ec1dbd6e829e66e21a5d8d5834e29885a0a32fe881049aa7252efef9ca789ee6479c1ce02e73d5d34855949517a0648a5db216893e02e1d4155bfe57c0f8aaa156eecc5694ad9187e64e88fe4d99702e2ee824bc1a83b3343ce07ed15d65a32f9b08e962bea38788bdd9ba4f045cae028522dcf5b9dfacd8deeb37ac20e93d7c094461f59a4b68b275dcb1f4aee5689908aff9cd65df1390781bb5ae2a46f7c10c63854cd73207ff3a8dfab7d48a6525010c7dbc05704c6cbaa2e9a0727bf83fa3d54d64d398c737ea4ff3d5241e38262a8805df790984ca64be5084c32ee66021a8e142181fec7ee8b5932578fb43e5b9d4ad1fe5d55fe376792bbba1185744efdf7e82afc5c31a72a91b2d5b91f4d5ef96b8b213f5942e2fa5fb5af7b5cde52f66c039a8bf2cfde21542752d10cc45ad27fc7f279b29daca54675f79f6a29146fc58cda741765cc384606b8d56b84d4e0c66e661b64f7ec5244cbeb67eed6813d12aa66aa00d811dea2c0e2bf28790a906ca20a9e422c428d7c668a14b43501518f7f45324c66c6ac37cc87ab7f4bd1c1c702b85124162fbff0f0c35d13418b048df226ec05f1025a9a30930b46a7d37aab77b0ecdc36caa43d0275719a462b953da4f7582a2ac1021f612cf6026f1c507aae6ac79964e1c0bb612507bc1539fd985b97a76ead6847807ff98d382972f0858ad7ddf6a6dcd8828ee463cfcc695d541e9bdd9698fb07313330ea055f1b56b93e35b30c773a36c53be66aeecb14532e632c98ad880a9dd6e05dd6c06b5bb46531bff4317b44a9c2a239448397908a660d597a16ce7516fadccb4533788734b7f227cea5f59f0c51242e8846ca45b0b6ae984d8a859cc527c71a14f049e0b33c9bbaaf55732b01cd3f686cad8cf2cb5f6f8a47fb76b29bd6cde0905c5a1123ba2260744f8ebc8691b4dc115695b9bd87304c9169a37b174fd5ca5a5ff5300e4f4e9b612049c00a47b006ed3e40586210d661e964681366482e483f52c29858659942f125b719757ce26fc0cdc3046370d4532153c1c1ace005507b904ca0389a6eb989e0762f23a16323680948efaa4553fef85de94ebc83ffd78bb620dd313814759fa3624329a1395bf06dff9c6f2d0778c2278a1b3a73187dcaed517495b025f4c4e554d3f0a622134c3dc385eac987b2bebc1f069ddb1932ed82df34db5b646baf794d3507d1b5ed50b981767f1de1ee84004d1f30be26de4ed6a4c4b03bd8edf18f6c80fc7ad64276f3423f4db7d626ad7f34947f291f107430075f719351e83ce4a71cf910ce6c4bba71cad7af949677da1bc6038c4a8947952b757f2cee4cb18856f5bfe33b3db930e03343b8b5f99b3a312763cb2a6f2f6648d0c4051a74a416a7f58fccd243fd75541428d8abcb8f57eb645041038eef0b9f85cb65282677378281b29da46363bd1c512d2bc05bbf7ae3d0ca54346e690fddc29b22f63fda2e278d8cbff97171d2e1b51bd6306ca0c96564638bce2f5e5f8a50171e98ce1126084bd79b981f39e0264e0cf148cc62724e9b546f9fb04b75afb40b75a165a86598f788", 0x1000}, {&(0x7f0000000400)="01baec3c88f9f64202487454673a029ff3b0d5d82fbd5395fafb3a83e56ca591cd19ebf8f21467719b7a9a0a56dcd8ad03e14ef7a57e77cb5828c3dd56226264940bc092c67eedccff0a59be17d5dc13a0c341a681c9d7623c6c79271727bbd3d012dbdb2c2ec43bd637251b1c86fd4f2d0211946fde73654e0e6533", 0x7c}, {&(0x7f0000001540)="961dbc581430338f62701bc842cb5dad639f578778ce4a381f1b1d1472f6051d15e484c45c0dfcb2b98f1ab39ad08767fec259", 0x33}], 0x5, 0x4e00) [ 1774.389975][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1774.389993][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1774.395763][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1774.401497][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:55:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x23e}, 0x28) 03:55:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0xfff7fffffffffffc, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x14}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r4, 0x3}}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:55:21 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:21 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1774.543046][ T5587] picdev_read: 26 callbacks suppressed [ 1774.543061][ T5587] kvm: pic: non byte read [ 1774.574892][ T5587] picdev_write: 26 callbacks suppressed [ 1774.574905][ T5587] kvm: pic: non byte write [ 1774.591322][ T5587] kvm: pic: non byte read [ 1774.597584][ T5587] kvm: pic: non byte write [ 1774.615874][ T5587] kvm: pic: non byte read [ 1774.635101][ T5587] kvm: pic: non byte write 03:55:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x23f}, 0x28) [ 1774.643913][ T5587] kvm: pic: non byte read [ 1774.677065][ T5587] kvm: pic: non byte write [ 1774.691558][ T5587] kvm: pic: non byte read [ 1774.705141][ T5587] kvm: pic: non byte write 03:55:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r3, &(0x7f0000000040), 0x8) listen(r3, 0x0) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x8) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1774.727015][ T5587] kvm: pic: non byte read [ 1774.734421][ T5587] kvm: pic: non byte write [ 1774.739718][ T5587] kvm: pic: non byte read [ 1774.745651][ T5587] kvm: pic: non byte write [ 1774.751681][ T5587] kvm: pic: non byte read [ 1774.764667][ T5587] kvm: pic: non byte write [ 1774.776110][ T5587] kvm: pic: non byte read [ 1774.786955][ T5587] kvm: pic: non byte write [ 1774.810571][ T5587] kvm: pic: non byte read [ 1774.817182][ T5587] kvm: pic: non byte write [ 1774.967818][ T5595] kvm: pic: single mode not supported [ 1774.968552][ T5595] kvm: pic: single mode not supported [ 1774.974745][ T5595] kvm: pic: single mode not supported [ 1774.981413][ T5595] kvm: pic: single mode not supported [ 1774.987387][ T5595] kvm: pic: single mode not supported [ 1778.789988][ C0] net_ratelimit: 22 callbacks suppressed [ 1778.801643][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1778.807394][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1779.910023][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1779.915818][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1779.921626][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1779.927345][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1779.933113][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1779.938829][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1780.630000][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1780.630033][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:55:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:55:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x22e}, 0x28) 03:55:30 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x240}, 0x28) 03:55:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r3, &(0x7f0000000040), 0x8) listen(r3, 0x0) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x8) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:55:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x440000, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f00000001c0)={0x79}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = fcntl$getown(r4, 0x9) perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb25c8aee908722a9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 03:55:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x241}, 0x28) 03:55:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r3, &(0x7f0000000040), 0x8) listen(r3, 0x0) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x8) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:55:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000007500000075000000040000001000000004000006040000000500000007000000080000000800000006000000040000000a000000050000000a0500000f0100000004000000080000000200000003000000040000000400000004080000ff7f0000f07f000005000000020000000400000005000000060000009bf50000f200"/148], &(0x7f0000000040)=""/62, 0x94, 0x3e}, 0x20) pwritev(r4, &(0x7f0000001580)=[{&(0x7f0000000380)="8ce98dd32cbc130d662a1685ac4a20a68734f015891275799d5d", 0x1a}, {&(0x7f00000003c0)="107423cd7de21feebfb93db630567315536b4237e76c0739664bd7824efa09", 0x1f}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000400)="01baec3c88f9f64202487454673a029ff3b0d5d82fbd5395fafb3a83e56ca591cd19ebf8f21467719b7a9a0a56dcd8ad03e14ef7a57e77cb5828c3dd56226264940bc092c67eedccff0a59be17d5dc13a0c341a681c9d7623c6c79271727bbd3d012dbdb2c2ec43bd637251b1c86fd4f2d0211946fde73654e0e6533", 0x7c}, {&(0x7f0000001540)="961dbc581430338f62701bc842cb5dad639f578778ce4a381f1b1d1472f6051d15e484c45c0dfcb2b98f1ab39ad08767fec259", 0x33}], 0x5, 0x4e00) 03:55:31 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x242}, 0x28) 03:55:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x22d}, 0x28) [ 1784.070036][ C1] net_ratelimit: 14 callbacks suppressed [ 1784.070054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1784.070141][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1784.070234][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1784.070330][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1784.070436][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1784.070520][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1784.088721][ T5633] picdev_read: 58 callbacks suppressed [ 1784.088735][ T5633] kvm: pic: non byte read [ 1784.088990][ T5633] picdev_write: 58 callbacks suppressed [ 1784.089007][ T5633] kvm: pic: non byte write [ 1784.089692][ T5633] kvm: pic: non byte read [ 1784.090454][ T5633] kvm: pic: non byte write [ 1784.091275][ T5633] kvm: pic: non byte read [ 1784.093313][ T5633] kvm: pic: non byte write [ 1784.093936][ T5633] kvm: pic: non byte read [ 1784.095576][ T5633] kvm: pic: non byte write [ 1784.097902][ T5633] kvm: pic: non byte read [ 1784.099370][ T5633] kvm: pic: non byte write [ 1784.102181][ T5633] kvm: pic: non byte read [ 1784.103849][ T5633] kvm: pic: non byte write [ 1784.104588][ T5633] kvm: pic: non byte read [ 1784.106267][ T5633] kvm: pic: non byte write [ 1784.106986][ T5633] kvm: pic: non byte read [ 1784.111676][ T5633] kvm: pic: non byte write [ 1784.112545][ T5633] kvm: pic: non byte read [ 1784.116217][ T5633] kvm: pic: non byte write [ 1784.119647][ T5633] kvm: pic: non byte read [ 1784.119848][ T5633] kvm: pic: non byte write [ 1784.790022][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1784.790029][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1784.790076][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1784.795801][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1789.190018][ C0] net_ratelimit: 23 callbacks suppressed [ 1789.190025][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1789.201458][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1790.310017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1790.315846][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1790.321649][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1790.327396][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1790.333183][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1790.338911][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1791.029997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1791.030035][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:55:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:55:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x79, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00', 0x1402}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r6}, 0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000400)={r6, 0x3abc, 0x81, 0x1, 0x4, 0x8}, 0x14) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={r6}, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000280)={'vcan0\x00', 0x6}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) r7 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r7, 0x8070ae9f, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000002c0)={0x0, 0x7b3}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000340)={0x40, 0x8008, 0x7, 0x2, r8}, &(0x7f0000000380)=0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r9, 0x0, 0x0, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) ioprio_get$uid(0x5, r11) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:55:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x22d}, 0x28) 03:55:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x243}, 0x28) 03:55:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x22b}, 0x28) 03:55:39 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9b\x0e3\\C6im\x9bX\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55515bdc50b38a3ebf3defb30f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x150) readv(r1, &(0x7f0000000600)=[{&(0x7f0000000100)=""/238, 0xffffffb5}, {&(0x7f0000000200)=""/197}, {&(0x7f0000000000)=""/32}, {&(0x7f0000000300)=""/129, 0xfffffffffffffebb}, {&(0x7f00000003c0)=""/160}, {&(0x7f0000000680)=""/136, 0x48}], 0x1) 03:55:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55515bdc50b38a3ebf3defb30f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="08ed44aa1a211fd616d85f62cb7cc796aecca587cb93f06cb4f7319dc3be3e04bcc043d715a3bb9a363d7c0f5d120830ffda039f19661e684d39055901fe2ce0e110f90d5f8f7c20cff69b91808af27350d3a9d6841a783360f8ff01ab498d537a75893fe769daeeb5a3d7dc667c898bc34a713604a5ef00b06b33d49712cbe9608a4975af2e0a01d19bf0fb040000000000000065fd9042a0ddd2a52ec80876"], 0xa0) readv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/32, 0x20}], 0x1) 03:55:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x244}, 0x28) [ 1792.482862][ T5661] picdev_read: 26 callbacks suppressed [ 1792.482867][ T5661] kvm: pic: non byte read [ 1792.517162][ T5661] picdev_write: 26 callbacks suppressed [ 1792.517167][ T5661] kvm: pic: non byte write 03:55:39 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1792.542442][ T5661] kvm: pic: non byte read [ 1792.549425][ T5661] kvm: pic: non byte write [ 1792.571341][ T5661] kvm: pic: non byte read [ 1792.587493][ T5661] kvm: pic: non byte write [ 1792.595917][ T5661] kvm: pic: non byte read [ 1792.606648][ T5661] kvm: pic: non byte write [ 1792.614789][ T5661] kvm: pic: non byte read [ 1792.628316][ T5661] kvm: pic: non byte write [ 1792.637574][ T5661] kvm: pic: non byte read [ 1792.648995][ T5661] kvm: pic: non byte write [ 1792.672134][ T5661] kvm: pic: non byte read 03:55:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x245}, 0x28) [ 1792.672325][ T5661] kvm: pic: non byte write [ 1792.672554][ T5661] kvm: pic: non byte read [ 1792.672656][ T5661] kvm: pic: non byte write 03:55:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffe9d, 0x0, 0x0, 0x800e00398) shutdown(r0, 0x0) [ 1792.683456][ T5661] kvm: pic: non byte read [ 1792.683586][ T5661] kvm: pic: non byte write [ 1792.683919][ T5661] kvm: pic: non byte read [ 1792.683985][ T5661] kvm: pic: non byte write [ 1794.470074][ C1] net_ratelimit: 15 callbacks suppressed [ 1794.470085][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1794.481617][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1794.487516][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1794.493262][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1794.498986][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1794.504738][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1795.190013][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1795.195775][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1795.199961][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1795.207225][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:55:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:55:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, &(0x7f0000000040), 0xffffffffffffff58) recvfrom$inet(r0, 0x0, 0xfffffe9d, 0x2, 0x0, 0x800e00398) shutdown(r0, 0x0) 03:55:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x4, 0x0, 0x9, 0x0, 0x7fffffff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:55:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x246}, 0x28) 03:55:44 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) r2 = add_key$user(0x0, 0x0, &(0x7f0000000280)='f', 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000580)=""/171, 0xab) add_key(0x0, &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="fe", 0x1, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, 0x0, 0x6) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) openat$cgroup_ro(r1, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r6 = request_key(0x0, &(0x7f0000000040)={'sVz'}, &(0x7f0000000a80), 0xfffffffffffffffd) keyctl$invalidate(0x15, r6) keyctl$get_persistent(0x16, r5, r6) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000680)={0x0, 0x0, @pic={0x0, 0x45, 0x0, 0x3f, 0x6, 0x8, 0x1f, 0x4, 0xff, 0x6, 0x1, 0x1, 0x0, 0x5, 0x3f}}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000400)="934f6185288154e00daa8f42ef70cf8a7bb38a26e6de2aa04a2f7ffb49508d600818d9c34b6c4cc2d1e91ecaf0552c8d94841f4c1e38535677695057e7e7b75d08fc9b2b6f461a857410bed765a9d394b1fb9ea59123316dd899edc6245ba913e5fe23f965b0ccc7325346f5121208bb030f15de543a2a911487b998afead2aa0a18a52719650f8916", 0x89, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 03:55:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x247}, 0x28) 03:55:45 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa5", 0x50}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:55:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x248}, 0x28) 03:55:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80802, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:55:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x249}, 0x28) [ 1799.590008][ C0] net_ratelimit: 23 callbacks suppressed [ 1799.590018][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1799.601499][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1800.710016][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1800.715834][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1800.721591][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1800.727307][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1800.733048][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1800.738761][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1801.430009][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1801.430053][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1804.870003][ C1] net_ratelimit: 13 callbacks suppressed [ 1804.870012][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1804.881437][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1804.887169][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1804.892893][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1804.898640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1804.904365][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1805.590010][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1805.590017][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1805.590063][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1805.595906][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:55:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:55:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x24a}, 0x28) 03:55:53 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) r2 = add_key$user(0x0, 0x0, &(0x7f0000000280)='f', 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000580)=""/171, 0xab) add_key(0x0, &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="fe", 0x1, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, 0x0, 0x6) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) openat$cgroup_ro(r1, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r6 = request_key(0x0, &(0x7f0000000040)={'sVz'}, &(0x7f0000000a80), 0xfffffffffffffffd) keyctl$invalidate(0x15, r6) keyctl$get_persistent(0x16, r5, r6) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000680)={0x0, 0x0, @pic={0x0, 0x45, 0x0, 0x3f, 0x6, 0x8, 0x1f, 0x4, 0xff, 0x6, 0x1, 0x1, 0x0, 0x5, 0x3f}}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000400)="934f6185288154e00daa8f42ef70cf8a7bb38a26e6de2aa04a2f7ffb49508d600818d9c34b6c4cc2d1e91ecaf0552c8d94841f4c1e38535677695057e7e7b75d08fc9b2b6f461a857410bed765a9d394b1fb9ea59123316dd899edc6245ba913e5fe23f965b0ccc7325346f5121208bb030f15de543a2a911487b998afead2aa0a18a52719650f8916", 0x89, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 03:55:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f00000001c0)={0x79}) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r6, 0x4068aea3, &(0x7f00000001c0)={0x79}) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r8, 0x4068aea3, &(0x7f00000001c0)={0x79}) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) bind$vsock_dgram(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) r9 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r9, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r10, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) 03:55:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:55:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x24b}, 0x28) 03:55:53 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x24c}, 0x28) 03:55:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xe) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:55:54 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:55:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x24d}, 0x28) [ 1807.052950][ T5803] picdev_read: 26 callbacks suppressed [ 1807.052956][ T5803] kvm: pic: non byte read [ 1807.090286][ T5803] picdev_write: 26 callbacks suppressed [ 1807.090293][ T5803] kvm: pic: non byte write [ 1807.127398][ T5803] kvm: pic: non byte read [ 1807.137708][ T5803] kvm: pic: non byte write [ 1809.990020][ C0] net_ratelimit: 24 callbacks suppressed [ 1809.995711][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1810.001473][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1811.110034][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1811.115903][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1811.121736][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1811.127443][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1811.133166][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1811.138997][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1811.830003][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1811.830045][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:56:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x24e}, 0x28) 03:56:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, 0x0, 0x0) r2 = add_key$user(0x0, 0x0, &(0x7f0000000280)='f', 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000580)=""/171, 0xab) add_key(0x0, &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="fe", 0x1, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, 0x0, 0x6) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) openat$cgroup_ro(r1, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r6 = request_key(0x0, &(0x7f0000000040)={'sVz'}, &(0x7f0000000a80), 0xfffffffffffffffd) keyctl$invalidate(0x15, r6) keyctl$get_persistent(0x16, r5, r6) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000680)={0x0, 0x0, @pic={0x0, 0x45, 0x0, 0x3f, 0x6, 0x8, 0x1f, 0x4, 0xff, 0x6, 0x1, 0x1, 0x0, 0x5, 0x3f}}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000400)="934f6185288154e00daa8f42ef70cf8a7bb38a26e6de2aa04a2f7ffb49508d600818d9c34b6c4cc2d1e91ecaf0552c8d94841f4c1e38535677695057e7e7b75d08fc9b2b6f461a857410bed765a9d394b1fb9ea59123316dd899edc6245ba913e5fe23f965b0ccc7325346f5121208bb030f15de543a2a911487b998afead2aa0a18a52719650f8916", 0x89, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 03:56:02 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x408200, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00', 0x1402}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r6}, 0xc) r7 = gettid() tkill(r7, 0x16) r8 = syz_open_procfs(r7, &(0x7f0000000540)='net/sco\x00') ioctl$PPPIOCGCHAN(r8, 0x80047437, &(0x7f0000000580)) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000400)={r6, 0x3abc, 0x81, 0x1, 0x4, 0x8}, 0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}}, 0x7ff, 0x7abe, 0x4, 0x0, 0x40}, &(0x7f0000000340)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000380)={r9, @in={{0x2, 0x4e21, @remote}}, 0x120, 0x4}, &(0x7f0000000440)=0x90) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:56:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x24f}, 0x28) 03:56:02 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x250}, 0x28) [ 1815.279975][ C1] net_ratelimit: 14 callbacks suppressed [ 1815.279984][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.291561][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1815.297384][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.303156][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1815.308920][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.314687][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:02 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x251}, 0x28) [ 1815.989978][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.990012][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1815.995775][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1816.229995][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.389968][ C0] net_ratelimit: 21 callbacks suppressed [ 1820.389975][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.401381][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1821.509990][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.515790][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1821.521588][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.527342][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1821.533109][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.538839][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:09 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, 0xffffffffffffffff, 0x0) r2 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:56:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x252}, 0x28) 03:56:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000040)=""/20, 0x14}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/157, 0x9d}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00551) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f00000005c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r1, 0x0) shutdown(r4, 0x0) 03:56:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f00000001c0)={0x79}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x100000, 0x2000007, 0x1, 0xc0a8, 0x0, [{0x7, 0xef, 0x0, [], 0x37}, {0xcf, 0x0, 0x0, [], 0x40}, {0x6f, 0x6, 0x7, [], 0x3}, {0xcb, 0x0, 0x2, [], 0x8}, {0xcd, 0x3, 0x1, [], 0x1}, {0x7f, 0x0, 0x0, [], 0x8}, {0x40, 0x0, 0x4, [], 0x2}, {0xdf, 0x5, 0x80, [], 0x2}, {0x2, 0x9, 0x39, [], 0x3}, {0x34, 0x4, 0x1, [], 0x9}, {0x80, 0x1f, 0x1, [], 0xc}, {0x0, 0x7, 0x6, [], 0x7f}, {0x43, 0x8, 0x7, [], 0x5b}, {0x6, 0x81, 0x8, [], 0x4}, {0x9, 0x8, 0x9, [], 0x3}, {0x9, 0x6, 0x8, [], 0x5}, {0x7, 0x3f, 0x7f, [], 0x5}, {0x4, 0x1f, 0xd6, [], 0x6}, {0x9f, 0x9, 0x7, [], 0x7f}, {0x9, 0x67, 0x0, [], 0x81}, {0x7f, 0x1f, 0x6, [], 0x3d}, {0x81, 0x1e, 0x80, [], 0x6d}, {0x8f, 0xf7, 0x2, [], 0x3}, {0x0, 0x71, 0x19, [], 0x8}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:56:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1822.229968][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1822.229974][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:56:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x253}, 0x28) 03:56:09 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1822.367777][ T5874] debugfs: Directory 'vcpu0' with parent '5874-6' already present! [ 1822.402816][ T5874] kvm: pic: non byte read 03:56:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x254}, 0x28) [ 1822.427940][ T5874] kvm: pic: non byte write [ 1822.432790][ T5874] kvm: pic: level sensitive irq not supported [ 1822.432951][ T5874] kvm: pic: non byte read [ 1822.454222][ T5874] kvm: pic: non byte write [ 1822.465504][ T5874] kvm: pic: single mode not supported [ 1822.465662][ T5874] kvm: pic: non byte read [ 1822.476404][ T5874] kvm: pic: non byte write [ 1822.476531][ T5874] kvm: pic: single mode not supported [ 1822.476740][ T5874] kvm: pic: non byte read [ 1822.477021][ T5874] kvm: pic: non byte write [ 1822.477156][ T5874] kvm: pic: single mode not supported [ 1822.477345][ T5874] kvm: pic: non byte read [ 1822.477479][ T5874] kvm: pic: non byte write [ 1822.477633][ T5874] kvm: pic: single mode not supported [ 1822.477738][ T5874] kvm: pic: non byte read [ 1822.477869][ T5874] kvm: pic: non byte write [ 1822.478258][ T5874] kvm: pic: single mode not supported [ 1822.478367][ T5874] kvm: pic: non byte read [ 1822.540228][ T5874] kvm: pic: non byte write [ 1822.556304][ T5874] kvm: pic: single mode not supported [ 1822.556444][ T5874] kvm: pic: non byte read 03:56:09 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x255}, 0x28) [ 1822.576730][ T5874] kvm: pic: non byte write [ 1822.588991][ T5874] kvm: pic: single mode not supported [ 1822.589162][ T5874] kvm: pic: non byte read [ 1822.607964][ T5874] kvm: pic: non byte write [ 1822.615239][ T5874] kvm: pic: single mode not supported [ 1822.615337][ T5874] kvm: pic: non byte read [ 1822.647807][ T5874] kvm: pic: non byte write [ 1822.647910][ T5874] kvm: pic: single mode not supported 03:56:09 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x256}, 0x28) [ 1822.648192][ T5874] kvm: pic: single mode not supported [ 1822.695213][ T5874] kvm: pic: level sensitive irq not supported [ 1822.774629][ T5877] debugfs: Directory 'vcpu0' with parent '5877-6' already present! [ 1825.670063][ C1] net_ratelimit: 15 callbacks suppressed [ 1825.675762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.681547][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.687304][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.693164][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.698950][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.704694][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1826.390062][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1826.390069][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1826.390113][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1826.395885][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1830.800034][ C0] net_ratelimit: 23 callbacks suppressed [ 1830.800044][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.811494][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1831.910015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.915780][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1831.921557][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.927270][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1831.933018][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.938750][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1832.630008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1832.635791][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, 0xffffffffffffffff, 0x0) r2 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:56:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x257}, 0x28) 03:56:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') socketpair(0xd, 0x80007, 0x9a, &(0x7f0000000340)={0xffffffffffffffff}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r7, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r7, 0x300, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x202c010) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="00048476", @ANYRES16=r4, @ANYBLOB="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"], 0x1e0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4800) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:56:20 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0xbaa) msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) 03:56:20 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x258}, 0x28) 03:56:20 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x259}, 0x28) 03:56:20 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x25a}, 0x28) 03:56:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x49692655ec783099, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1836.070016][ C1] net_ratelimit: 15 callbacks suppressed [ 1836.075687][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1836.081428][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1836.087191][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1836.092918][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1836.098689][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1836.104447][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1836.790057][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1836.790088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1836.795861][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1836.801528][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:56:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket(0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, 0xffffffffffffffff, 0x0) r2 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:56:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x25b}, 0x28) 03:56:27 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, 0x0) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f00000003c0)) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="500000081329d5e49f25eff1baa6d30820fd019b428025b58d8beb27e698ecb9d45c8a5cc8db4775bd1a8ef8ec788f1db908bfd604b8b086111d9944ee08b073864dd9ef", @ANYRES16=r4, @ANYBLOB="020025bd7000fcdbdf25010000001800040004000000050000000300000000800000080000000800030000800000140001000b3919767d1aaba2c23bfc85eb8b003f08000200a65aebf6"], 0x50}, 0x1, 0x0, 0x0, 0x20040840}, 0x4040004) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:56:27 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:56:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x25c}, 0x28) [ 1840.206679][ T5968] 9pnet: Insufficient options for proto=fd [ 1840.281469][ T5969] picdev_read: 60 callbacks suppressed [ 1840.281475][ T5969] kvm: pic: non byte read [ 1840.316965][ T5969] picdev_write: 62 callbacks suppressed [ 1840.316971][ T5969] kvm: pic: non byte write 03:56:27 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x25d}, 0x28) 03:56:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000100)="fe761a", 0x3, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x1) [ 1840.339178][ T5969] kvm: pic: non byte read [ 1840.353790][ T5969] kvm: pic: non byte write [ 1840.375141][ T5969] kvm: pic: non byte read [ 1840.384040][ T5969] kvm: pic: non byte write [ 1840.396484][ T5969] kvm: pic: non byte read [ 1840.414517][ T5969] kvm: pic: non byte write [ 1840.425072][ T5969] kvm: pic: non byte read [ 1840.435157][ T5969] kvm: pic: non byte write 03:56:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x25e}, 0x28) [ 1840.443570][ T5969] kvm: pic: non byte read [ 1840.448111][ T5969] kvm: pic: non byte write [ 1840.455826][ T5969] kvm: pic: non byte read [ 1840.474682][ T5969] kvm: pic: non byte write 03:56:27 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) [ 1840.520448][ T5969] kvm: pic: non byte read [ 1840.525233][ T5969] kvm: pic: non byte write [ 1840.545520][ T5969] kvm: pic: non byte read [ 1840.559055][ T5969] kvm: pic: non byte write [ 1840.570385][ T5969] kvm: pic: non byte read [ 1840.574803][ T5969] kvm: pic: non byte write [ 1841.189985][ C0] net_ratelimit: 24 callbacks suppressed [ 1841.189998][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.201629][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1842.310016][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1842.315800][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1842.321648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1842.327437][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1842.333205][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1842.338969][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1843.029979][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1843.030011][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1846.469989][ C1] net_ratelimit: 15 callbacks suppressed [ 1846.469999][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1846.481464][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1846.487360][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1846.493103][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1846.498891][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1846.504619][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1847.189967][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1847.189974][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1847.190006][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1847.195774][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:56:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:56:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000100)="fe761a", 0x3, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x1) 03:56:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x25f}, 0x28) 03:56:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x100000, 0x50) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:56:34 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x260}, 0x28) 03:56:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000100)="fe761a", 0x3, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x1) 03:56:34 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDENABIO(r4, 0x4b36) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:56:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1847.987170][ T6032] picdev_read: 26 callbacks suppressed [ 1847.987174][ T6032] kvm: pic: non byte read [ 1847.997192][ T6032] picdev_write: 26 callbacks suppressed [ 1847.997206][ T6032] kvm: pic: non byte write [ 1848.007939][ T6032] kvm: pic: non byte read [ 1848.012556][ T6032] kvm: pic: non byte write [ 1848.017679][ T6032] kvm: pic: non byte read [ 1848.022260][ T6032] kvm: pic: non byte write [ 1848.027340][ T6032] kvm: pic: non byte read [ 1848.032273][ T6032] kvm: pic: non byte write [ 1848.037127][ T6032] kvm: pic: non byte read [ 1848.041739][ T6032] kvm: pic: non byte write [ 1848.046857][ T6032] kvm: pic: non byte read [ 1848.051446][ T6032] kvm: pic: non byte write [ 1848.056537][ T6032] kvm: pic: non byte read [ 1848.061244][ T6032] kvm: pic: non byte write [ 1848.066349][ T6032] kvm: pic: non byte read [ 1848.070914][ T6032] kvm: pic: non byte write [ 1848.076142][ T6032] kvm: pic: non byte read [ 1848.081205][ T6032] kvm: pic: non byte write [ 1848.086248][ T6032] kvm: pic: non byte read [ 1848.091356][ T6032] kvm: pic: non byte write [ 1848.199648][ T6037] pic_ioport_write: 50 callbacks suppressed [ 1848.199652][ T6037] kvm: pic: single mode not supported [ 1848.205975][ T6037] kvm: pic: single mode not supported [ 1848.211724][ T6037] kvm: pic: single mode not supported [ 1848.217458][ T6037] kvm: pic: single mode not supported [ 1848.223239][ T6037] kvm: pic: single mode not supported [ 1848.228904][ T6037] kvm: pic: single mode not supported [ 1851.590028][ C0] net_ratelimit: 23 callbacks suppressed [ 1851.601098][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.606820][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1852.710024][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1852.715803][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1852.721628][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1852.727357][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1852.733167][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1852.738900][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1853.429996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1853.430002][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:56:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:56:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x261}, 0x28) 03:56:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000100)="fe761a", 0x3, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x1) 03:56:44 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @pic={0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:56:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x262}, 0x28) [ 1856.869979][ C1] net_ratelimit: 16 callbacks suppressed [ 1856.869990][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1856.881458][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1856.887225][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1856.892989][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1856.898740][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1856.904510][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000100)="fe761a", 0x3, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 03:56:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x263}, 0x28) [ 1857.045033][ T6047] picdev_read: 62 callbacks suppressed [ 1857.045052][ T6047] kvm: pic: non byte read [ 1857.045851][ T6047] picdev_write: 62 callbacks suppressed [ 1857.045863][ T6047] kvm: pic: non byte write [ 1857.046036][ T6047] kvm: pic: single mode not supported [ 1857.047402][ T6047] kvm: pic: non byte read [ 1857.047618][ T6047] kvm: pic: non byte write 03:56:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000100)="fe761a", 0x3, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 03:56:44 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000040)=0x1) setsockopt(r2, 0x519, 0x1ff, &(0x7f0000000280)="b36c78f2b5b596bdc84ddc0644c35448fc7c390832c31924e6593fbbfebe321e41deb3fd3805476c1c2e9273e9c6c5b7acfdf76fe1210e47d1a33e727f3212f9d20f5e4c9347ecc7c14feb349b151a35bac21687bef271e2495a267ab56e7e0c5a3fe950cd3f8dc2400dd69cf9ff3c386d5e32afd4e3e8a53fda93b7feb98da086699b9d6eb93ad58846590934c0cba58cb2549832c9409e12918c495c474634a95e9b83aa33113e1c407abb51d1da0bb77bc6fc9b10bd01bfba1ca8df8fff84ef998f2647007500c435fc140710df46915c54ecd296432d4802413d5079ec2125bff50101eb", 0xe6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1857.365828][ T6069] kvm: pic: non byte read [ 1857.366190][ T6069] kvm: pic: non byte write [ 1857.376142][ T6069] kvm: pic: non byte read [ 1857.376326][ T6069] kvm: pic: non byte write [ 1857.590023][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1857.590045][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1857.595821][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1857.601617][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1861.990006][ C0] net_ratelimit: 23 callbacks suppressed [ 1861.990016][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1862.001450][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1863.110032][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1863.115850][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1863.121744][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1863.127476][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1863.133265][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1863.138990][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1863.829991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1863.830014][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000100)="fe761a", 0x3, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 03:56:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r2, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9fefdd5feb8ad4e628d98327a51b7ddaa2df7f548ce49f95b4df792e499067500c2c129e0d42560db4e48d0a03784aee29a5f04acd3a93905c3c58970086b8b46d679d16f8314ac4ab9bae41330440ed876a759cf0782696b2360a28376ba67ef877a8c7c0292a5ec6709562a02bf146c3e061cfdaa130c4d4142d67517326518b6e7039ea1694369097a6ed09fbef1f7d9b6503355515000def0452ce0652e517ea99898ae06c02ea5d8c5b04eb62e7b1107cba1364575e06f58c2560"], 0x1}}, 0x48000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000180)="7fef8c02c053d1995b825662f5cda18bfccfc514db6e4754c18f0f740c23f814fe9ecb39d6e44d19c69de8b7b8f6e7e92291c745dbb2b35af1877443fc457cc597df3c1ec7e55e34dcd36f478bc683feb346428e0b2eb6f54327bda24285e3f0eddb441ab8e262ee00ff5934009bfeb2aaf6c8f4148ab29564fce0ed2145a6d585a5d381887f5d44f6ebb0d07ff1f861ff826c65369bc7aa6108ca755bd5422aba0fc9c666b7fbea8149595f4acf3645cf856ac1ffc28e7d09926e2f83e910e8df6b49", 0xc3) close(r1) getsockopt(0xffffffffffffffff, 0x8001, 0x8, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) socket(0x10, 0x80002, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002100)={@dev={0xfe, 0x80, [], 0x28}, @ipv4={[], [], @loopback}, @remote, 0x3, 0x1, 0x9c9, 0x500, 0xdd, 0x800010}) 03:56:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x264}, 0x28) 03:56:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000040)=0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:56:53 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52", 0xf0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000400000000000000095000000000000002ba728e315f529a3fec394560b78bc325e693f5c2898d6fbd30cb599e8d36bb3019c1abd23212fb56fa54f26fb0b73d0e6adeffc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35d84a22a550d65296800c86ae3b3e05df3ceb9fc4f4c2a100c788b277beee1cbf9b343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449a9e802f59c3e05374b5aeb05bf02d2be22278d00db1eca88ee5c867ddd58211d6ececb0cd2b6d35fb8580218ce740068725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b20001000000000081f36c67d1b4411a00000000000000000000000000353b3046da0fe9301036d7b482b0189575b3e9460b15c33fd8771006057c5e8a1ad6d67a1b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x265}, 0x28) 03:56:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x266}, 0x28) [ 1866.350696][ T6092] kvm: pic: non byte read [ 1866.350777][ T6092] kvm: pic: non byte write [ 1866.357172][ T6092] kvm: pic: non byte read 03:56:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x1) [ 1866.357252][ T6092] kvm: pic: non byte write [ 1866.357440][ T6092] kvm: pic: non byte read [ 1866.357550][ T6092] kvm: pic: non byte write [ 1866.357783][ T6092] kvm: pic: non byte read [ 1866.357841][ T6092] kvm: pic: non byte write [ 1866.363365][ T6092] kvm: pic: non byte read [ 1866.363433][ T6092] kvm: pic: non byte write [ 1866.363705][ T6092] kvm: pic: non byte read [ 1866.363860][ T6092] kvm: pic: non byte write [ 1866.364086][ T6092] kvm: pic: non byte read [ 1866.365335][ T6092] kvm: pic: non byte write [ 1866.365598][ T6092] kvm: pic: non byte read 03:56:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x11, 0x0, &(0x7f0000000040)="21a872b369154bb989cee70cf27f1c3f97", 0x0, 0x267}, 0x28) [ 1866.365718][ T6092] kvm: pic: non byte write [ 1866.365989][ T6092] kvm: pic: non byte read [ 1866.366053][ T6092] kvm: pic: non byte write [ 1866.374165][ T6092] kvm: pic: non byte read [ 1866.374255][ T6092] kvm: pic: non byte write 03:56:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='\xde\xff\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bsg\x00', 0x412000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000300)={0x3, 'bridge_slave_0\x00', 0x1}, 0x18) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3ff}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x71521875cf92aa1, 0x0) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000280)={0x80fd, 0x2}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:56:53 executing program 3: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r3, &(0x7f0000000880)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b2r\xc3\x16\xb1\x9bV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 03:56:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x10004e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x1) [ 1867.270044][ C1] net_ratelimit: 15 callbacks suppressed [ 1867.275740][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1867.281483][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1867.287266][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1867.293107][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1867.298894][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1867.304615][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1867.989987][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1867.995767][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1867.999962][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1868.007221][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1872.389985][ C0] net_ratelimit: 23 callbacks suppressed [ 1872.395714][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1872.401478][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1872.697716][T29056] ================================================================== [ 1872.705893][T29056] BUG: KCSAN: data-race in balance_dirty_pages / percpu_counter_add_batch [ 1872.714406][T29056] [ 1872.716760][T29056] read to 0xffff8880ab8f0c90 of 8 bytes by task 6121 on cpu 1: [ 1872.724322][T29056] balance_dirty_pages+0x106d/0x1ba0 [ 1872.729590][T29056] balance_dirty_pages_ratelimited+0x752/0xb40 [ 1872.735781][T29056] generic_perform_write+0x22d/0x320 [ 1872.741307][T29056] __generic_file_write_iter+0x251/0x380 [ 1872.746923][T29056] ext4_file_write_iter+0x1bd/0xa00 [ 1872.752100][T29056] new_sync_write+0x388/0x4a0 [ 1872.756753][T29056] __vfs_write+0xb1/0xc0 [ 1872.760972][T29056] vfs_write+0x18a/0x390 [ 1872.765217][T29056] ksys_write+0xd5/0x1b0 [ 1872.769438][T29056] __x64_sys_write+0x4c/0x60 [ 1872.774010][T29056] do_syscall_64+0xcc/0x370 [ 1872.778494][T29056] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1872.784381][T29056] [ 1872.786693][T29056] write to 0xffff8880ab8f0c90 of 8 bytes by task 29056 on cpu 0: [ 1872.794406][T29056] percpu_counter_add_batch+0xca/0x150 [ 1872.799845][T29056] __test_set_page_writeback+0x732/0x7d0 [ 1872.805455][T29056] ext4_bio_write_page+0x157/0xb90 [ 1872.810565][T29056] mpage_submit_page+0xe4/0x1a0 [ 1872.815410][T29056] mpage_map_and_submit_buffers+0x331/0x520 [ 1872.821380][T29056] ext4_writepages+0x1458/0x2300 [ 1872.826307][T29056] do_writepages+0x6b/0x170 [ 1872.830808][T29056] __writeback_single_inode+0xaf/0x8e0 [ 1872.838070][T29056] writeback_sb_inodes+0x4ba/0xa50 [ 1872.843159][T29056] __writeback_inodes_wb+0xe8/0x1b0 [ 1872.848335][T29056] wb_writeback+0x557/0x6a0 [ 1872.852827][T29056] wb_workfn+0x696/0x970 [ 1872.857062][T29056] process_one_work+0x3d4/0x890 [ 1872.861921][T29056] worker_thread+0xa0/0x800 [ 1872.866420][T29056] kthread+0x1d4/0x200 [ 1872.870481][T29056] ret_from_fork+0x1f/0x30 [ 1872.874936][T29056] [ 1872.877258][T29056] Reported by Kernel Concurrency Sanitizer on: [ 1872.883488][T29056] CPU: 0 PID: 29056 Comm: kworker/u4:1 Not tainted 5.4.0-syzkaller #0 [ 1872.891659][T29056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1872.901796][T29056] Workqueue: writeback wb_workfn (flush-8:0) [ 1872.907753][T29056] ================================================================== [ 1872.915839][T29056] Kernel panic - not syncing: panic_on_warn set ... [ 1872.922418][T29056] CPU: 0 PID: 29056 Comm: kworker/u4:1 Not tainted 5.4.0-syzkaller #0 [ 1872.930558][T29056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1872.940613][T29056] Workqueue: writeback wb_workfn (flush-8:0) [ 1872.946586][T29056] Call Trace: [ 1872.949894][T29056] dump_stack+0x11d/0x181 [ 1872.954228][T29056] panic+0x210/0x640 [ 1872.958106][T29056] ? vprintk_func+0x8d/0x140 [ 1872.962683][T29056] kcsan_report.cold+0xc/0xd [ 1872.967259][T29056] kcsan_setup_watchpoint+0x3fe/0x460 [ 1872.972616][T29056] __tsan_unaligned_write8+0xc4/0x100 [ 1872.977978][T29056] percpu_counter_add_batch+0xca/0x150 [ 1872.983431][T29056] __test_set_page_writeback+0x732/0x7d0 [ 1872.989066][T29056] ext4_bio_write_page+0x157/0xb90 [ 1872.994188][T29056] mpage_submit_page+0xe4/0x1a0 [ 1872.999023][T29056] mpage_map_and_submit_buffers+0x331/0x520 [ 1873.004899][T29056] ? tag_mount+0x2f/0x960 [ 1873.009216][T29056] ext4_writepages+0x1458/0x2300 [ 1873.014146][T29056] ? __sanitizer_cov_trace_const_cmp8+0x19/0x20 [ 1873.020380][T29056] ? ext4_mark_inode_dirty+0x420/0x420 [ 1873.025816][T29056] do_writepages+0x6b/0x170 [ 1873.030297][T29056] ? do_writepages+0x6b/0x170 [ 1873.034954][T29056] ? __read_once_size+0x41/0xe0 [ 1873.039786][T29056] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1873.045539][T29056] ? find_next_bit+0xcb/0xe0 [ 1873.050118][T29056] __writeback_single_inode+0xaf/0x8e0 [ 1873.055557][T29056] ? _raw_spin_unlock+0x4b/0x60 [ 1873.060390][T29056] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1873.066619][T29056] writeback_sb_inodes+0x4ba/0xa50 [ 1873.071762][T29056] __writeback_inodes_wb+0xe8/0x1b0 [ 1873.076948][T29056] wb_writeback+0x557/0x6a0 [ 1873.081440][T29056] wb_workfn+0x696/0x970 [ 1873.085667][T29056] ? __perf_event_task_sched_out+0x14d/0xaa0 [ 1873.091633][T29056] process_one_work+0x3d4/0x890 [ 1873.096482][T29056] worker_thread+0xa0/0x800 [ 1873.101002][T29056] kthread+0x1d4/0x200 [ 1873.105101][T29056] ? rescuer_thread+0x6a0/0x6a0 [ 1873.109946][T29056] ? kthread_stop+0x2d0/0x2d0 [ 1873.114614][T29056] ret_from_fork+0x1f/0x30 [ 1874.256879][T29056] Shutting down cpus with NMI [ 1874.263140][T29056] Kernel Offset: disabled [ 1874.267519][T29056] Rebooting in 86400 seconds..