0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r1, 0x0) 08:52:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, 0xffffffffffffffff, 0x0) 08:52:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r1, 0x0) 08:52:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:52:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, 0xffffffffffffffff, 0x0) 08:52:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:52:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r1 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:52:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, 0xffffffffffffffff, 0x0) 08:52:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r1 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:51 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r1 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x0, 0x0, 0x0, 0x884, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:53 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r0, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r1 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000100)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r0, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r1 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000100)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:55 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:55 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:55 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000180)) 08:52:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r3, 0x40045010, &(0x7f0000000000)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r3, 0x40045010, &(0x7f0000000000)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={0x0, 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:56 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={0x0, "e690ffaaf906213fb366573b356bb6a8"}) 08:52:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r3, 0x40045010, &(0x7f0000000000)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)) 08:52:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={0x0, 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={0x0, 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1f, 0x3f, 0x7c, 0x1, 0x0, 0x0, 0x884, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x151c, 0x9, 0x8, 0x8, 0x5, 0x401, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0xa) r1 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000840)={r2, "e690ffaaf906213fb366573b356bb6a8"}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:52:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r3, 0x40045010, &(0x7f0000000000)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 5: sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000001600)={0xe4, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x58, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40400000}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}]}]}, @TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x15}, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @private1, 0x3}}}}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20006000}, 0x40000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000c, 0x10010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0), 0xf3, 0x82) preadv(r1, &(0x7f0000001580)=[{&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)=""/18, 0x12}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/223, 0xdf}, {&(0x7f0000000440)=""/67, 0x43}, {&(0x7f00000004c0)=""/174, 0xae}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x8, 0x3, 0x1f) statfs(0x0, 0x0) 08:52:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={0x0, 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={0x0, 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r3, 0x40045010, &(0x7f0000000000)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140)}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 1: sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000001600)={0xe4, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x58, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40400000}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}]}]}, @TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x15}, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @private1, 0x3}}}}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20006000}, 0x40000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000c, 0x10010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0), 0xf3, 0x82) preadv(r1, &(0x7f0000001580)=[{&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)=""/18, 0x12}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/223, 0xdf}, {&(0x7f0000000440)=""/67, 0x43}, {&(0x7f00000004c0)=""/174, 0xae}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x8, 0x3, 0x1f) statfs(0x0, 0x0) 08:52:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x0, r4}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x1c0, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {0xc, 0xffff}, {0x1d, 0x4}, {0xb, 0xc}}, [@TCA_STAB={0x134, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x1, 0x4, 0x101, 0x0, 0x1, 0x2, 0x3}}, {0xa, 0x2, [0x0, 0x6, 0xa6]}}, {{0x1c, 0x1, {0x9, 0x3, 0x101, 0x4, 0x0, 0x9, 0xfbac, 0xa}}, {0x18, 0x2, [0x0, 0x12, 0x2, 0x9, 0x0, 0x7, 0x8, 0x6, 0xd50, 0x2]}}, {{0x1c, 0x1, {0x20, 0x1, 0x7ff, 0x0, 0x0, 0x3, 0x5, 0x2}}, {0x8, 0x2, [0x7, 0x8000]}}, {{0x1c, 0x1, {0x20, 0x3, 0xdb, 0x7, 0x0, 0x1, 0x101, 0x5}}, {0xe, 0x2, [0x8a, 0x922, 0xcab, 0x0, 0x4]}}, {{0x1c, 0x1, {0x1, 0x0, 0x7, 0x3, 0x1, 0xfffffffd, 0x10000, 0x8}}, {0x14, 0x2, [0x9, 0x329, 0x1, 0x1, 0xffff, 0x400, 0x449e, 0x727]}}, {{0x1c, 0x1, {0x9, 0x3, 0x0, 0x2, 0x1, 0xffffffef, 0x5, 0x2}}, {0x8, 0x2, [0x5, 0x3f]}}, {{0x1c, 0x1, {0x0, 0x7, 0x2, 0x401, 0x0, 0xfffffffe, 0x1, 0x7}}, {0x12, 0x2, [0x2, 0x800, 0xff, 0x7, 0x7, 0x1000, 0xfff8]}}]}, @TCA_RATE={0x6, 0x5, {0x8, 0x20}}, @qdisc_kind_options=@q_tbf={{0x8}, {0xc, 0x2, [@TCA_TBF_PBURST={0x8, 0x7, 0x1cc5}]}}, @TCA_RATE={0x6, 0x5, {0x1f, 0x6}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_STAB={0x34, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x75, 0x81, 0x80, 0x4, 0x0, 0x80000001, 0x0, 0x7}}, {0x12, 0x2, [0x9, 0xffff, 0x0, 0x1, 0xf000, 0x3, 0x0]}}]}, @TCA_RATE={0x6, 0x5, {0xaf, 0x80}}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x4048000}, 0x804) 08:52:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={0x0, 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 08:52:57 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140)}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 1: sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000001600)={0xe4, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x58, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40400000}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}]}]}, @TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x15}, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @private1, 0x3}}}}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20006000}, 0x40000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000c, 0x10010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0), 0xf3, 0x82) preadv(r1, &(0x7f0000001580)=[{&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)=""/18, 0x12}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/223, 0xdf}, {&(0x7f0000000440)=""/67, 0x43}, {&(0x7f00000004c0)=""/174, 0xae}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x8, 0x3, 0x1f) statfs(0x0, 0x0) [ 1087.091068] audit: type=1800 audit(1625820777.606:31422): pid=1446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14790 res=0 08:52:57 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140)}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x0, r4}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x1c0, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {0xc, 0xffff}, {0x1d, 0x4}, {0xb, 0xc}}, [@TCA_STAB={0x134, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x1, 0x4, 0x101, 0x0, 0x1, 0x2, 0x3}}, {0xa, 0x2, [0x0, 0x6, 0xa6]}}, {{0x1c, 0x1, {0x9, 0x3, 0x101, 0x4, 0x0, 0x9, 0xfbac, 0xa}}, {0x18, 0x2, [0x0, 0x12, 0x2, 0x9, 0x0, 0x7, 0x8, 0x6, 0xd50, 0x2]}}, {{0x1c, 0x1, {0x20, 0x1, 0x7ff, 0x0, 0x0, 0x3, 0x5, 0x2}}, {0x8, 0x2, [0x7, 0x8000]}}, {{0x1c, 0x1, {0x20, 0x3, 0xdb, 0x7, 0x0, 0x1, 0x101, 0x5}}, {0xe, 0x2, [0x8a, 0x922, 0xcab, 0x0, 0x4]}}, {{0x1c, 0x1, {0x1, 0x0, 0x7, 0x3, 0x1, 0xfffffffd, 0x10000, 0x8}}, {0x14, 0x2, [0x9, 0x329, 0x1, 0x1, 0xffff, 0x400, 0x449e, 0x727]}}, {{0x1c, 0x1, {0x9, 0x3, 0x0, 0x2, 0x1, 0xffffffef, 0x5, 0x2}}, {0x8, 0x2, [0x5, 0x3f]}}, {{0x1c, 0x1, {0x0, 0x7, 0x2, 0x401, 0x0, 0xfffffffe, 0x1, 0x7}}, {0x12, 0x2, [0x2, 0x800, 0xff, 0x7, 0x7, 0x1000, 0xfff8]}}]}, @TCA_RATE={0x6, 0x5, {0x8, 0x20}}, @qdisc_kind_options=@q_tbf={{0x8}, {0xc, 0x2, [@TCA_TBF_PBURST={0x8, 0x7, 0x1cc5}]}}, @TCA_RATE={0x6, 0x5, {0x1f, 0x6}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_STAB={0x34, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x75, 0x81, 0x80, 0x4, 0x0, 0x80000001, 0x0, 0x7}}, {0x12, 0x2, [0x9, 0xffff, 0x0, 0x1, 0xf000, 0x3, 0x0]}}]}, @TCA_RATE={0x6, 0x5, {0xaf, 0x80}}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x4048000}, 0x804) 08:52:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:57 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140)}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1087.318956] audit: type=1800 audit(1625820777.836:31423): pid=1468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14767 res=0 08:52:57 executing program 2: ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x0, r4}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x1c0, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {0xc, 0xffff}, {0x1d, 0x4}, {0xb, 0xc}}, [@TCA_STAB={0x134, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x1, 0x4, 0x101, 0x0, 0x1, 0x2, 0x3}}, {0xa, 0x2, [0x0, 0x6, 0xa6]}}, {{0x1c, 0x1, {0x9, 0x3, 0x101, 0x4, 0x0, 0x9, 0xfbac, 0xa}}, {0x18, 0x2, [0x0, 0x12, 0x2, 0x9, 0x0, 0x7, 0x8, 0x6, 0xd50, 0x2]}}, {{0x1c, 0x1, {0x20, 0x1, 0x7ff, 0x0, 0x0, 0x3, 0x5, 0x2}}, {0x8, 0x2, [0x7, 0x8000]}}, {{0x1c, 0x1, {0x20, 0x3, 0xdb, 0x7, 0x0, 0x1, 0x101, 0x5}}, {0xe, 0x2, [0x8a, 0x922, 0xcab, 0x0, 0x4]}}, {{0x1c, 0x1, {0x1, 0x0, 0x7, 0x3, 0x1, 0xfffffffd, 0x10000, 0x8}}, {0x14, 0x2, [0x9, 0x329, 0x1, 0x1, 0xffff, 0x400, 0x449e, 0x727]}}, {{0x1c, 0x1, {0x9, 0x3, 0x0, 0x2, 0x1, 0xffffffef, 0x5, 0x2}}, {0x8, 0x2, [0x5, 0x3f]}}, {{0x1c, 0x1, {0x0, 0x7, 0x2, 0x401, 0x0, 0xfffffffe, 0x1, 0x7}}, {0x12, 0x2, [0x2, 0x800, 0xff, 0x7, 0x7, 0x1000, 0xfff8]}}]}, @TCA_RATE={0x6, 0x5, {0x8, 0x20}}, @qdisc_kind_options=@q_tbf={{0x8}, {0xc, 0x2, [@TCA_TBF_PBURST={0x8, 0x7, 0x1cc5}]}}, @TCA_RATE={0x6, 0x5, {0x1f, 0x6}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_STAB={0x34, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x75, 0x81, 0x80, 0x4, 0x0, 0x80000001, 0x0, 0x7}}, {0x12, 0x2, [0x9, 0xffff, 0x0, 0x1, 0xf000, 0x3, 0x0]}}]}, @TCA_RATE={0x6, 0x5, {0xaf, 0x80}}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x4048000}, 0x804) 08:52:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140)}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:58 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000180)) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x7f, 0x3, 0x4, 0x14000, 0xf0, {}, {0x4, 0x2, 0x6a, 0x6, 0x80, 0xff, "d89437a7"}, 0x6, 0x3, @planes=&(0x7f0000000000)={0x40, 0x9, @mem_offset=0x7f, 0xef}, 0x7fffffff, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000100)=0xbc7) r2 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f00000001c0)={0xfffff800, 0x6, "60232b33697884753d98130d5e99704b8488f9caeb0f64465a4ab2b7a5ce0f52", 0x7ff, 0x80000200, 0x80000000, 0x0, 0x233}) dup2(r1, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000240), 0x214700) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r4, 0xc034564b, &(0x7f0000000280)={0x0, 0x39565559, 0x6458, 0x2, 0x2, @stepwise={{0xfffffffe, 0x91}, {0x44e4}, {0x2, 0x2ea}}}) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000140)={0x0, 0x2}) 08:52:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) [ 1087.464008] audit: type=1800 audit(1625820777.976:31424): pid=1480 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14785 res=0 08:52:58 executing program 2: ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:58 executing program 1 (fault-call:5 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140)}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1087.664725] audit: type=1800 audit(1625820778.176:31425): pid=1494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14779 res=0 [ 1087.670081] FAULT_INJECTION: forcing a failure. [ 1087.670081] name failslab, interval 1, probability 0, space 0, times 0 08:52:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1087.753631] CPU: 0 PID: 1498 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 [ 1087.761456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.771685] Call Trace: [ 1087.774285] dump_stack+0x1fc/0x2ef [ 1087.777930] should_fail.cold+0xa/0xf [ 1087.781748] ? setup_fault_attr+0x200/0x200 [ 1087.786079] ? lock_acquire+0x170/0x3c0 [ 1087.790136] __should_failslab+0x115/0x180 [ 1087.794469] should_failslab+0x5/0x10 [ 1087.798283] kmem_cache_alloc+0x277/0x370 08:52:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1087.802440] getname_flags+0xce/0x590 [ 1087.806246] __x64_sys_execveat+0xce/0x120 [ 1087.810486] do_syscall_64+0xf9/0x620 [ 1087.814297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.819506] RIP: 0033:0x4665d9 [ 1087.822704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1087.841612] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 08:52:58 executing program 2: ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140)}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100), &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) [ 1087.849327] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1087.856703] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1087.863977] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1087.871256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1087.878530] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 08:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:58 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) [ 1088.012335] audit: type=1800 audit(1625820778.526:31426): pid=1523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14775 res=0 08:52:58 executing program 1 (fault-call:5 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:58 executing program 4 (fault-call:6 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100), &(0x7f0000000140)=0x14) 08:52:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:58 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1088.180644] FAULT_INJECTION: forcing a failure. [ 1088.180644] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.205612] audit: type=1800 audit(1625820778.716:31427): pid=1544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14788 res=0 08:52:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1088.210989] CPU: 0 PID: 1541 Comm: syz-executor.4 Not tainted 4.19.196-syzkaller #0 [ 1088.233221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.242580] Call Trace: [ 1088.245181] dump_stack+0x1fc/0x2ef [ 1088.248823] should_fail.cold+0xa/0xf [ 1088.252640] ? setup_fault_attr+0x200/0x200 [ 1088.256983] ? lock_acquire+0x170/0x3c0 [ 1088.260985] __should_failslab+0x115/0x180 [ 1088.265237] should_failslab+0x5/0x10 [ 1088.269065] kmem_cache_alloc+0x277/0x370 [ 1088.273238] getname_flags+0xce/0x590 [ 1088.277055] __x64_sys_execveat+0xce/0x120 [ 1088.281306] do_syscall_64+0xf9/0x620 [ 1088.285126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.290319] RIP: 0033:0x4665d9 [ 1088.293520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.309791] FAULT_INJECTION: forcing a failure. [ 1088.309791] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1088.312424] RSP: 002b:00007f8f17423188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1088.331926] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1088.339192] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1088.346455] RBP: 00007f8f174231d0 R08: 0000000000001100 R09: 0000000000000000 [ 1088.353740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1088.360997] R13: 00007fffee2666ff R14: 00007f8f17423300 R15: 0000000000022000 [ 1088.368279] CPU: 1 PID: 1545 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 [ 1088.376088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.385449] Call Trace: [ 1088.388052] dump_stack+0x1fc/0x2ef [ 1088.391707] should_fail.cold+0xa/0xf [ 1088.395534] ? setup_fault_attr+0x200/0x200 [ 1088.399864] ? _copy_from_user+0xd2/0x130 [ 1088.404026] __alloc_pages_nodemask+0x239/0x2890 [ 1088.408791] ? check_preemption_disabled+0x41/0x280 [ 1088.413816] ? lock_downgrade+0x720/0x720 [ 1088.417981] ? __lock_acquire+0x6de/0x3ff0 [ 1088.422401] ? proc_fail_nth_write+0x95/0x1d0 [ 1088.426923] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1088.431785] ? ksys_write+0x241/0x2a0 [ 1088.435603] ? lock_downgrade+0x720/0x720 [ 1088.439769] ? vfs_write+0x3d7/0x540 [ 1088.443508] cache_grow_begin+0xa4/0x8a0 [ 1088.447582] ? setup_fault_attr+0x200/0x200 [ 1088.451915] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 1088.456690] cache_alloc_refill+0x273/0x340 [ 1088.461020] kmem_cache_alloc+0x346/0x370 [ 1088.465292] getname_flags+0xce/0x590 [ 1088.469110] __x64_sys_execveat+0xce/0x120 [ 1088.473354] do_syscall_64+0xf9/0x620 [ 1088.477166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.482357] RIP: 0033:0x4665d9 [ 1088.485584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.504493] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1088.512210] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1088.519489] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 08:52:58 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:58 executing program 2: openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:59 executing program 2: openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:59 executing program 2: openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:52:59 executing program 4 (fault-call:6 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) [ 1088.526770] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1088.534045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1088.541329] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 [ 1088.612778] FAULT_INJECTION: forcing a failure. [ 1088.612778] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.625173] CPU: 1 PID: 1565 Comm: syz-executor.4 Not tainted 4.19.196-syzkaller #0 [ 1088.632980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.642336] Call Trace: [ 1088.644966] dump_stack+0x1fc/0x2ef [ 1088.648607] should_fail.cold+0xa/0xf [ 1088.652415] ? setup_fault_attr+0x200/0x200 [ 1088.656743] ? lock_acquire+0x170/0x3c0 [ 1088.660732] __should_failslab+0x115/0x180 [ 1088.664976] should_failslab+0x5/0x10 [ 1088.668785] kmem_cache_alloc+0x277/0x370 [ 1088.673029] dup_fd+0x85/0xbf0 [ 1088.676227] ? unshare_files+0xac/0x260 [ 1088.680211] unshare_files+0x16c/0x260 [ 1088.684103] ? __ia32_sys_unshare+0x40/0x40 [ 1088.688437] ? rcu_nmi_exit+0xb3/0x180 [ 1088.692330] ? retint_kernel+0x2d/0x2d [ 1088.696225] __do_execve_file+0x28d/0x2360 [ 1088.700472] ? open_exec+0x70/0x70 [ 1088.704039] ? check_preemption_disabled+0x41/0x280 [ 1088.708585] FAULT_INJECTION: forcing a failure. [ 1088.708585] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.709072] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1088.709092] ? __phys_addr+0x9a/0x110 [ 1088.729231] ? __check_object_size+0x17b/0x3e0 [ 1088.733841] do_execveat+0x3d/0x50 [ 1088.737423] __x64_sys_execveat+0xe1/0x120 [ 1088.741666] do_syscall_64+0xf9/0x620 [ 1088.745481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.750672] RIP: 0033:0x4665d9 [ 1088.753875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.772778] RSP: 002b:00007f8f17423188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1088.780490] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1088.787758] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1088.795027] RBP: 00007f8f174231d0 R08: 0000000000001100 R09: 0000000000000000 [ 1088.802296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:52:59 executing program 1 (fault-call:5 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:59 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100), &(0x7f0000000140)=0x14) 08:52:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x0, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 08:52:59 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, 0x0) [ 1088.809575] R13: 00007fffee2666ff R14: 00007f8f17423300 R15: 0000000000022000 [ 1088.820559] audit: type=1800 audit(1625820779.147:31428): pid=1583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14785 res=0 [ 1088.849851] CPU: 0 PID: 1584 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 [ 1088.857944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.867298] Call Trace: [ 1088.869898] dump_stack+0x1fc/0x2ef [ 1088.873539] should_fail.cold+0xa/0xf [ 1088.877353] ? setup_fault_attr+0x200/0x200 [ 1088.881704] ? lock_acquire+0x170/0x3c0 [ 1088.885868] __should_failslab+0x115/0x180 [ 1088.890115] should_failslab+0x5/0x10 [ 1088.893918] kmem_cache_alloc+0x277/0x370 [ 1088.898072] dup_fd+0x85/0xbf0 [ 1088.901275] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1088.906127] ? proc_tgid_io_accounting+0x7f0/0x7f0 08:52:59 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, 0x0) [ 1088.911080] unshare_files+0x16c/0x260 [ 1088.914981] ? __ia32_sys_unshare+0x40/0x40 [ 1088.919398] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1088.924165] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1088.928761] __do_execve_file+0x28d/0x2360 [ 1088.933007] ? retint_kernel+0x2d/0x2d [ 1088.936902] ? open_exec+0x70/0x70 [ 1088.940452] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1088.945649] ? __phys_addr+0x9a/0x110 [ 1088.949460] ? __check_object_size+0x17b/0x3e0 [ 1088.954060] do_execveat+0x3d/0x50 [ 1088.957616] __x64_sys_execveat+0xe1/0x120 [ 1088.961865] do_syscall_64+0xf9/0x620 [ 1088.965679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.970871] RIP: 0033:0x4665d9 [ 1088.974064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.985647] audit: type=1800 audit(1625820779.497:31429): pid=1595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14795 res=0 08:52:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x0, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:59 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:59 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, 0x0) [ 1088.992958] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1088.992971] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1088.992978] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1088.992987] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1088.992995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1088.993003] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 08:52:59 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:59 executing program 4 (fault-call:6 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:52:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) socket(0x100000000011, 0x2, 0x0) 08:52:59 executing program 1 (fault-call:5 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:52:59 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:52:59 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)) 08:52:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x0, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1089.273652] audit: type=1800 audit(1625820779.787:31430): pid=1620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14795 res=0 [ 1089.303601] FAULT_INJECTION: forcing a failure. [ 1089.303601] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.319091] FAULT_INJECTION: forcing a failure. 08:52:59 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)) [ 1089.319091] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.340202] CPU: 0 PID: 1623 Comm: syz-executor.4 Not tainted 4.19.196-syzkaller #0 [ 1089.348044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.357403] Call Trace: [ 1089.360006] dump_stack+0x1fc/0x2ef [ 1089.363639] should_fail.cold+0xa/0xf [ 1089.367450] ? setup_fault_attr+0x200/0x200 [ 1089.371767] ? lock_acquire+0x170/0x3c0 [ 1089.375749] __should_failslab+0x115/0x180 [ 1089.379979] should_failslab+0x5/0x10 [ 1089.383769] kmem_cache_alloc+0x277/0x370 [ 1089.387912] dup_fd+0x85/0xbf0 [ 1089.391109] ? unshare_files+0x73/0x260 [ 1089.395095] unshare_files+0x16c/0x260 [ 1089.398992] ? __ia32_sys_unshare+0x40/0x40 [ 1089.403315] ? rcu_nmi_exit+0xb3/0x180 [ 1089.407212] __do_execve_file+0x28d/0x2360 [ 1089.411454] ? open_exec+0x70/0x70 [ 1089.414990] ? __phys_addr+0x9a/0x110 [ 1089.418790] ? __check_object_size+0x17b/0x3e0 [ 1089.423378] do_execveat+0x3d/0x50 [ 1089.426912] __x64_sys_execveat+0xe1/0x120 [ 1089.431137] do_syscall_64+0xf9/0x620 [ 1089.434932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.440120] RIP: 0033:0x4665d9 [ 1089.443303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1089.462300] RSP: 002b:00007f8f17423188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 08:53:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) 08:53:00 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1089.470011] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1089.477276] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1089.484547] RBP: 00007f8f174231d0 R08: 0000000000001100 R09: 0000000000000000 [ 1089.491814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1089.499085] R13: 00007fffee2666ff R14: 00007f8f17423300 R15: 0000000000022000 [ 1089.522739] CPU: 1 PID: 1622 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 [ 1089.530565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.539921] Call Trace: [ 1089.542529] dump_stack+0x1fc/0x2ef [ 1089.546173] should_fail.cold+0xa/0xf [ 1089.549986] ? setup_fault_attr+0x200/0x200 [ 1089.554316] ? lock_acquire+0x170/0x3c0 [ 1089.558323] __should_failslab+0x115/0x180 [ 1089.562568] should_failslab+0x5/0x10 [ 1089.566383] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1089.571501] __kmalloc_node+0x38/0x70 [ 1089.575321] kvmalloc_node+0x61/0xf0 [ 1089.579060] alloc_fdtable+0xcd/0x280 [ 1089.582873] dup_fd+0x6a2/0xbf0 [ 1089.586178] unshare_files+0x16c/0x260 [ 1089.588453] audit: type=1800 audit(1625820780.037:31431): pid=1634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14802 res=0 [ 1089.590070] ? __ia32_sys_unshare+0x40/0x40 [ 1089.590098] ? lock_downgrade+0x720/0x720 [ 1089.590121] __do_execve_file+0x28d/0x2360 [ 1089.622575] ? should_fail+0x142/0x7b0 [ 1089.626486] ? open_exec+0x70/0x70 [ 1089.630049] ? check_preemption_disabled+0x41/0x280 [ 1089.635101] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1089.640302] ? __phys_addr+0x9a/0x110 [ 1089.644112] ? __check_object_size+0x17b/0x3e0 [ 1089.648747] do_execveat+0x3d/0x50 [ 1089.652308] __x64_sys_execveat+0xe1/0x120 [ 1089.656575] do_syscall_64+0xf9/0x620 [ 1089.660394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.665658] RIP: 0033:0x4665d9 [ 1089.668858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1089.687765] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1089.695489] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1089.702767] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1089.710045] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1089.717322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:53:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:00 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1089.724603] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 08:53:00 executing program 4 (fault-call:6 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:00 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)) 08:53:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:00 executing program 1 (fault-call:5 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1089.911070] FAULT_INJECTION: forcing a failure. [ 1089.911070] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.933218] FAULT_INJECTION: forcing a failure. [ 1089.933218] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.945867] CPU: 0 PID: 1659 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 08:53:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1089.953681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.963107] Call Trace: [ 1089.965712] dump_stack+0x1fc/0x2ef [ 1089.969356] should_fail.cold+0xa/0xf [ 1089.973171] ? setup_fault_attr+0x200/0x200 [ 1089.977589] ? lock_acquire+0x170/0x3c0 [ 1089.981601] __should_failslab+0x115/0x180 [ 1089.985847] should_failslab+0x5/0x10 [ 1089.989664] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1089.994789] __kmalloc_node+0x38/0x70 [ 1089.998607] kvmalloc_node+0x61/0xf0 [ 1090.002357] alloc_fdtable+0xcd/0x280 [ 1090.006163] dup_fd+0x6a2/0xbf0 [ 1090.009448] ? rcu_nmi_exit+0xb3/0x180 [ 1090.013342] unshare_files+0x16c/0x260 [ 1090.017240] ? __ia32_sys_unshare+0x40/0x40 [ 1090.021581] ? __do_execve_file+0x243/0x2360 [ 1090.026110] __do_execve_file+0x28d/0x2360 [ 1090.030453] ? open_exec+0x70/0x70 [ 1090.034009] ? check_preemption_disabled+0x41/0x280 [ 1090.039033] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1090.044226] ? __phys_addr+0x9a/0x110 [ 1090.048042] ? __check_object_size+0x17b/0x3e0 [ 1090.052639] do_execveat+0x3d/0x50 [ 1090.056191] __x64_sys_execveat+0xe1/0x120 [ 1090.060478] do_syscall_64+0xf9/0x620 [ 1090.064302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.069496] RIP: 0033:0x4665d9 [ 1090.072704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.091618] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1090.099355] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 08:53:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1090.106636] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1090.113915] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1090.121192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1090.128472] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 [ 1090.144724] CPU: 0 PID: 1660 Comm: syz-executor.4 Not tainted 4.19.196-syzkaller #0 [ 1090.152538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:53:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1090.161894] Call Trace: [ 1090.164498] dump_stack+0x1fc/0x2ef [ 1090.168143] should_fail.cold+0xa/0xf [ 1090.171967] ? setup_fault_attr+0x200/0x200 [ 1090.176303] ? lock_acquire+0x170/0x3c0 [ 1090.180297] __should_failslab+0x115/0x180 [ 1090.184543] should_failslab+0x5/0x10 [ 1090.188359] kmem_cache_alloc_trace+0x284/0x380 [ 1090.193046] alloc_fdtable+0x7e/0x280 [ 1090.196860] dup_fd+0x6a2/0xbf0 [ 1090.200153] ? rcu_nmi_exit+0xb3/0x180 [ 1090.204053] unshare_files+0x16c/0x260 [ 1090.207951] ? __ia32_sys_unshare+0x40/0x40 08:53:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) [ 1090.212285] ? __do_execve_file+0x243/0x2360 [ 1090.216703] __do_execve_file+0x28d/0x2360 [ 1090.220952] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1090.225720] ? open_exec+0x70/0x70 [ 1090.229274] ? retint_kernel+0x2d/0x2d [ 1090.233179] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1090.238373] ? __phys_addr+0x9a/0x110 [ 1090.242183] ? __check_object_size+0x17b/0x3e0 [ 1090.246781] do_execveat+0x3d/0x50 [ 1090.250386] __x64_sys_execveat+0xe1/0x120 [ 1090.254632] do_syscall_64+0xf9/0x620 [ 1090.258447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.263647] RIP: 0033:0x4665d9 [ 1090.266844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.285755] RSP: 002b:00007f8f17423188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1090.293479] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1090.300756] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1090.308041] RBP: 00007f8f174231d0 R08: 0000000000001100 R09: 0000000000000000 [ 1090.315319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1090.322598] R13: 00007fffee2666ff R14: 00007f8f17423300 R15: 0000000000022000 08:53:00 executing program 4 (fault-call:6 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:00 executing program 1 (fault-call:5 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x0, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x0, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1090.452431] FAULT_INJECTION: forcing a failure. [ 1090.452431] name failslab, interval 1, probability 0, space 0, times 0 08:53:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1090.509823] FAULT_INJECTION: forcing a failure. [ 1090.509823] name failslab, interval 1, probability 0, space 0, times 0 08:53:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x0, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1090.551047] CPU: 0 PID: 1695 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 [ 1090.558879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.568243] Call Trace: [ 1090.570855] dump_stack+0x1fc/0x2ef [ 1090.574512] should_fail.cold+0xa/0xf [ 1090.578329] ? setup_fault_attr+0x200/0x200 [ 1090.582659] ? lock_acquire+0x170/0x3c0 [ 1090.586649] __should_failslab+0x115/0x180 [ 1090.590897] should_failslab+0x5/0x10 [ 1090.594701] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1090.599821] __kmalloc_node+0x38/0x70 [ 1090.603627] kvmalloc_node+0x61/0xf0 [ 1090.607349] alloc_fdtable+0x139/0x280 [ 1090.611251] dup_fd+0x6a2/0xbf0 [ 1090.614549] unshare_files+0x16c/0x260 [ 1090.618444] ? __ia32_sys_unshare+0x40/0x40 [ 1090.622773] ? cache_alloc_refill+0x2f8/0x340 [ 1090.627277] __do_execve_file+0x28d/0x2360 [ 1090.631526] ? lock_downgrade+0x720/0x720 [ 1090.635693] ? open_exec+0x70/0x70 [ 1090.639247] ? do_raw_spin_unlock+0x171/0x230 [ 1090.643746] ? check_preemption_disabled+0x41/0x280 [ 1090.648779] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1090.653976] ? __phys_addr+0x9a/0x110 [ 1090.657792] ? __check_object_size+0x17b/0x3e0 [ 1090.662386] do_execveat+0x3d/0x50 [ 1090.665941] __x64_sys_execveat+0xe1/0x120 [ 1090.670187] do_syscall_64+0xf9/0x620 [ 1090.673997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.679186] RIP: 0033:0x4665d9 [ 1090.682380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.701284] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1090.708998] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1090.716280] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1090.723571] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1090.730844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1090.738117] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 [ 1090.745414] CPU: 1 PID: 1696 Comm: syz-executor.4 Not tainted 4.19.196-syzkaller #0 [ 1090.753218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.762571] Call Trace: [ 1090.765167] dump_stack+0x1fc/0x2ef [ 1090.768807] should_fail.cold+0xa/0xf [ 1090.772609] ? setup_fault_attr+0x200/0x200 [ 1090.776935] ? lock_acquire+0x170/0x3c0 [ 1090.780922] __should_failslab+0x115/0x180 [ 1090.785165] should_failslab+0x5/0x10 [ 1090.788979] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1090.794093] __kmalloc_node+0x38/0x70 [ 1090.797899] kvmalloc_node+0x61/0xf0 [ 1090.801624] alloc_fdtable+0xcd/0x280 [ 1090.805523] dup_fd+0x6a2/0xbf0 [ 1090.808823] unshare_files+0x16c/0x260 [ 1090.812728] ? __ia32_sys_unshare+0x40/0x40 [ 1090.817057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1090.821823] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1090.826618] __do_execve_file+0x28d/0x2360 [ 1090.830861] ? rcu_nmi_exit+0xb3/0x180 [ 1090.834761] ? open_exec+0x70/0x70 [ 1090.838309] ? check_preemption_disabled+0x41/0x280 [ 1090.843331] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1090.848532] ? __phys_addr+0x9a/0x110 [ 1090.852337] ? __check_object_size+0x17b/0x3e0 [ 1090.856933] do_execveat+0x3d/0x50 [ 1090.860482] __x64_sys_execveat+0xe1/0x120 [ 1090.864726] do_syscall_64+0xf9/0x620 [ 1090.868538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.873733] RIP: 0033:0x4665d9 [ 1090.876927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:53:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x0, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c0, 0xaa) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1090.895830] RSP: 002b:00007f8f17423188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1090.903543] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1090.910816] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1090.918089] RBP: 00007f8f174231d0 R08: 0000000000001100 R09: 0000000000000000 [ 1090.925365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1090.932639] R13: 00007fffee2666ff R14: 00007f8f17423300 R15: 0000000000022000 08:53:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) statfs(0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x0, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:01 executing program 1 (fault-call:5 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:01 executing program 4 (fault-call:6 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x0, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1091.054694] FAULT_INJECTION: forcing a failure. [ 1091.054694] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.067493] FAULT_INJECTION: forcing a failure. [ 1091.067493] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.120571] CPU: 0 PID: 1739 Comm: syz-executor.4 Not tainted 4.19.196-syzkaller #0 [ 1091.128507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.137860] Call Trace: [ 1091.140471] dump_stack+0x1fc/0x2ef [ 1091.144105] should_fail.cold+0xa/0xf [ 1091.147915] ? setup_fault_attr+0x200/0x200 [ 1091.152241] ? lock_acquire+0x170/0x3c0 [ 1091.156226] __should_failslab+0x115/0x180 [ 1091.160465] should_failslab+0x5/0x10 [ 1091.164280] kmem_cache_alloc_trace+0x284/0x380 08:53:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x0, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1091.168958] __do_execve_file+0x33b/0x2360 [ 1091.173212] ? open_exec+0x70/0x70 [ 1091.176766] ? __phys_addr+0x9a/0x110 [ 1091.180576] ? __check_object_size+0x17b/0x3e0 [ 1091.185178] do_execveat+0x3d/0x50 [ 1091.188735] __x64_sys_execveat+0xe1/0x120 [ 1091.192999] do_syscall_64+0xf9/0x620 [ 1091.196810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.201999] RIP: 0033:0x4665d9 08:53:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1091.205196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.224092] RSP: 002b:00007f8f17423188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1091.231810] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1091.239091] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1091.246356] RBP: 00007f8f174231d0 R08: 0000000000001100 R09: 0000000000000000 [ 1091.253614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1091.260874] R13: 00007fffee2666ff R14: 00007f8f17423300 R15: 0000000000022000 [ 1091.296503] CPU: 0 PID: 1740 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 [ 1091.304327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.313767] Call Trace: [ 1091.316375] dump_stack+0x1fc/0x2ef [ 1091.320062] should_fail.cold+0xa/0xf [ 1091.323870] ? setup_fault_attr+0x200/0x200 [ 1091.328196] ? lock_acquire+0x170/0x3c0 [ 1091.332192] __should_failslab+0x115/0x180 [ 1091.336526] should_failslab+0x5/0x10 [ 1091.340334] kmem_cache_alloc+0x277/0x370 08:53:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x0, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1091.344500] prepare_creds+0x39/0x510 [ 1091.348313] prepare_exec_creds+0xd/0xf0 [ 1091.352378] __do_execve_file+0x3a9/0x2360 [ 1091.356643] ? rcu_nmi_exit+0xb3/0x180 [ 1091.360544] ? open_exec+0x70/0x70 [ 1091.364101] ? strncpy_from_user+0x1ef/0x350 [ 1091.368517] do_execveat+0x3d/0x50 [ 1091.372068] __x64_sys_execveat+0xe1/0x120 [ 1091.376315] do_syscall_64+0xf9/0x620 [ 1091.380131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.385318] RIP: 0033:0x4665d9 08:53:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1091.388534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.407439] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1091.415152] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1091.422427] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1091.429699] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1091.436973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:53:01 executing program 4 (fault-call:6 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) [ 1091.444244] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 08:53:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1091.561494] FAULT_INJECTION: forcing a failure. [ 1091.561494] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.584220] CPU: 0 PID: 1768 Comm: syz-executor.4 Not tainted 4.19.196-syzkaller #0 [ 1091.592039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.601395] Call Trace: [ 1091.603993] dump_stack+0x1fc/0x2ef [ 1091.607627] should_fail.cold+0xa/0xf 08:53:02 executing program 1 (fault-call:5 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1091.611438] ? setup_fault_attr+0x200/0x200 [ 1091.615770] ? lock_acquire+0x170/0x3c0 [ 1091.619758] __should_failslab+0x115/0x180 [ 1091.624009] should_failslab+0x5/0x10 [ 1091.627847] kmem_cache_alloc_trace+0x284/0x380 [ 1091.632612] __do_execve_file+0x33b/0x2360 [ 1091.637030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1091.641797] ? open_exec+0x70/0x70 [ 1091.645344] ? retint_kernel+0x2d/0x2d [ 1091.649254] do_execveat+0x3d/0x50 [ 1091.652808] __x64_sys_execveat+0xe1/0x120 [ 1091.657049] do_syscall_64+0xf9/0x620 [ 1091.660857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.666139] RIP: 0033:0x4665d9 [ 1091.669335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.682689] FAULT_INJECTION: forcing a failure. [ 1091.682689] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.688232] RSP: 002b:00007f8f17423188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 08:53:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1091.688248] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1091.688257] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1091.688266] RBP: 00007f8f174231d0 R08: 0000000000001100 R09: 0000000000000000 [ 1091.688274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1091.688283] R13: 00007fffee2666ff R14: 00007f8f17423300 R15: 0000000000022000 08:53:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1091.782010] CPU: 0 PID: 1778 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 [ 1091.789839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.799204] Call Trace: [ 1091.801902] dump_stack+0x1fc/0x2ef [ 1091.805637] should_fail.cold+0xa/0xf [ 1091.809456] ? setup_fault_attr+0x200/0x200 [ 1091.813782] ? lock_acquire+0x170/0x3c0 [ 1091.817765] __should_failslab+0x115/0x180 [ 1091.822046] should_failslab+0x5/0x10 [ 1091.825880] kmem_cache_alloc+0x277/0x370 [ 1091.830034] prepare_creds+0x39/0x510 [ 1091.833858] prepare_exec_creds+0xd/0xf0 [ 1091.837922] __do_execve_file+0x3a9/0x2360 [ 1091.842162] ? lock_downgrade+0x720/0x720 [ 1091.846330] ? open_exec+0x70/0x70 [ 1091.849896] ? check_preemption_disabled+0x41/0x280 [ 1091.854914] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1091.860104] ? __phys_addr+0x9a/0x110 [ 1091.863912] ? __check_object_size+0x17b/0x3e0 [ 1091.868515] do_execveat+0x3d/0x50 [ 1091.872064] __x64_sys_execveat+0xe1/0x120 [ 1091.876304] do_syscall_64+0xf9/0x620 08:53:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1091.880111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.885303] RIP: 0033:0x4665d9 [ 1091.888499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.907660] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1091.915370] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1091.922647] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1091.929922] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1091.937201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1091.944471] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 08:53:02 executing program 4 (fault-call:6 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x0, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:02 executing program 1 (fault-call:5 fault-nth:8): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1092.106772] FAULT_INJECTION: forcing a failure. [ 1092.106772] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.144656] FAULT_INJECTION: forcing a failure. [ 1092.144656] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.167049] CPU: 1 PID: 1814 Comm: syz-executor.1 Not tainted 4.19.196-syzkaller #0 [ 1092.175047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.184399] Call Trace: [ 1092.186995] dump_stack+0x1fc/0x2ef [ 1092.190636] should_fail.cold+0xa/0xf [ 1092.194448] ? setup_fault_attr+0x200/0x200 [ 1092.198791] ? lock_acquire+0x170/0x3c0 [ 1092.202782] __should_failslab+0x115/0x180 [ 1092.207025] should_failslab+0x5/0x10 [ 1092.210831] kmem_cache_alloc+0x277/0x370 [ 1092.214989] __alloc_file+0x21/0x330 [ 1092.218828] alloc_empty_file+0x6d/0x170 [ 1092.222893] path_openat+0xe9/0x2df0 [ 1092.226606] ? is_bpf_text_address+0xfc/0x1b0 [ 1092.231105] ? kernel_text_address+0xbd/0xf0 [ 1092.235607] ? __kernel_text_address+0x9/0x30 [ 1092.240108] ? unwind_get_return_address+0x51/0x90 [ 1092.245038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.250411] ? __kernel_text_address+0x9/0x30 [ 1092.254905] ? path_lookupat+0x8d0/0x8d0 [ 1092.258976] ? kasan_kmalloc+0x139/0x160 [ 1092.263061] do_filp_open+0x18c/0x3f0 [ 1092.266862] ? may_open_dev+0xf0/0xf0 [ 1092.270665] ? __lock_acquire+0x6de/0x3ff0 [ 1092.274912] ? lock_acquire+0x170/0x3c0 [ 1092.278882] ? __do_execve_file+0x38c/0x2360 [ 1092.283293] ? mark_held_locks+0xf0/0xf0 [ 1092.287527] ? __mutex_lock+0x365/0x1200 [ 1092.291591] ? should_fail+0x142/0x7b0 [ 1092.295569] ? fs_reclaim_release+0xd0/0x110 [ 1092.300096] ? apparmor_cred_prepare+0xe8/0x610 [ 1092.304762] do_open_execat+0x11d/0x5b0 [ 1092.308735] ? __do_execve_file+0x7c5/0x2360 [ 1092.313140] ? __se_sys_uselib+0x400/0x400 [ 1092.317378] ? lock_acquire+0x170/0x3c0 [ 1092.321441] ? __do_execve_file+0x4d4/0x2360 [ 1092.325845] ? check_preemption_disabled+0x41/0x280 [ 1092.330864] __do_execve_file+0x1a8b/0x2360 [ 1092.335206] ? open_exec+0x70/0x70 [ 1092.338833] ? check_preemption_disabled+0x41/0x280 [ 1092.343880] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1092.349064] ? __phys_addr+0x9a/0x110 [ 1092.352867] ? __check_object_size+0x17b/0x3e0 [ 1092.357463] do_execveat+0x3d/0x50 [ 1092.361006] __x64_sys_execveat+0xe1/0x120 [ 1092.365240] do_syscall_64+0xf9/0x620 [ 1092.369054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.374251] RIP: 0033:0x4665d9 [ 1092.377468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.396362] RSP: 002b:00007f4ded70d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1092.404167] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 08:53:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1092.411432] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1092.418693] RBP: 00007f4ded70d1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1092.425954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1092.433215] R13: 00007ffeeeb9870f R14: 00007f4ded70d300 R15: 0000000000022000 [ 1092.440508] CPU: 0 PID: 1810 Comm: syz-executor.4 Not tainted 4.19.196-syzkaller #0 [ 1092.448302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.457652] Call Trace: [ 1092.460244] dump_stack+0x1fc/0x2ef [ 1092.463912] should_fail.cold+0xa/0xf 08:53:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1092.467720] ? setup_fault_attr+0x200/0x200 [ 1092.472066] ? __should_failslab+0xdb/0x180 [ 1092.476397] __should_failslab+0x115/0x180 [ 1092.480638] should_failslab+0x5/0x10 [ 1092.484449] kmem_cache_alloc+0x277/0x370 [ 1092.488612] __alloc_file+0x21/0x330 [ 1092.492334] alloc_empty_file+0x6d/0x170 [ 1092.496405] path_openat+0xe9/0x2df0 [ 1092.500128] ? retint_kernel+0x2d/0x2d [ 1092.504034] ? path_lookupat+0x8d0/0x8d0 [ 1092.508101] ? depot_save_stack+0x106/0x410 [ 1092.512448] ? kasan_kmalloc+0x139/0x160 08:53:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1092.516515] do_filp_open+0x18c/0x3f0 [ 1092.520319] ? may_open_dev+0xf0/0xf0 [ 1092.524126] ? __lock_acquire+0x6de/0x3ff0 [ 1092.528380] ? mark_held_locks+0xa6/0xf0 [ 1092.532455] ? mark_held_locks+0xf0/0xf0 [ 1092.536523] ? mark_held_locks+0xa6/0xf0 [ 1092.540633] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1092.545405] do_open_execat+0x11d/0x5b0 [ 1092.549398] ? __do_execve_file+0x7c5/0x2360 [ 1092.553813] ? __se_sys_uselib+0x400/0x400 [ 1092.558064] ? check_preemption_disabled+0x41/0x280 [ 1092.563177] __do_execve_file+0x1a8b/0x2360 [ 1092.567509] ? open_exec+0x70/0x70 [ 1092.571064] ? rcu_nmi_exit+0xb3/0x180 [ 1092.574960] ? retint_kernel+0x2d/0x2d [ 1092.578855] do_execveat+0x3d/0x50 [ 1092.582405] __x64_sys_execveat+0xe1/0x120 [ 1092.586648] do_syscall_64+0xf9/0x620 [ 1092.590455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.595844] RIP: 0033:0x4665d9 [ 1092.599037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.617937] RSP: 002b:00007f8f17423188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1092.625644] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1092.632911] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1092.640181] RBP: 00007f8f174231d0 R08: 0000000000001100 R09: 0000000000000000 [ 1092.647458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1092.654721] R13: 00007fffee2666ff R14: 00007f8f17423300 R15: 0000000000022000 08:53:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x0, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x0, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x0, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:03 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x0, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:03 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x0, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x0, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x4800) 08:53:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x0, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x4800) 08:53:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x0, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x4800) 08:53:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1118) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:53:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:53:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x0) 08:53:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1118) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x0, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x0, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x0, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) fcntl$setown(r1, 0x8, r2) r3 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000180)={0x16, @empty, 0x4e20, 0x0, 'rr\x00', 0x10, 0x4, 0x48}, 0x2c) r3 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1095.870446] IPVS: set_ctl: invalid protocol: 22 0.0.0.0:20000 08:53:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1096.068864] IPVS: set_ctl: invalid protocol: 22 0.0.0.0:20000 08:53:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r1, 0x0, r2, 0x0, 0x8000, 0x0) sendmsg(r2, &(0x7f0000001c40)={&(0x7f00000005c0)=@phonet={0x23, 0x5, 0xfb, 0x1}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000640)="31ebe8dd5db72b4d724e2a6c598797a3f71208b131e7e26cfa55210fd16cfde1bbae911667d92bb5892f0dc9647d4eea3dc1b71c0b77469176bd2776017abb8db5482586", 0x44}, {&(0x7f00000006c0)="196a661e9c7582776c0e39235bc98ea6dd4c47d72e28d601962403da832e3809512a8b85b916dc80aed5220cdf047fe00968abed4728cd1820e56139c7cce60d39b0d743affe718b32c9be573101165eac78ee2b4b3ef40272c4eccc7fc189d77584ddcfd6609e34cee52ed15d25749cc42c2c4cd28565956225ba43d6fe4764672e990fd38af9f3f28aa21eb9844b", 0x8f}, {&(0x7f0000000780)="72f506771ae3260d57f301e3", 0xc}, {&(0x7f00000007c0)="70603343873c6783dccee7f38919d1170fbe6d76b6c8e459e316a8e714849ac24be2f45d480d91a19dfe0248fc29a25995da827ddd221e", 0x37}, {&(0x7f0000000800)="2a26c2da7dc83a0cceb53a3f7e3c026c4b2d6ac07d4988293dec860b5ca4e1028564ea34ed9b61c77649e2367c0375fd30c840c07510295cde2573567e5f5e3ce55d831f8b9f51f4c8180a317a8be7fddcdf08", 0x53}, {&(0x7f0000000880)="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", 0x1000}], 0x6, &(0x7f0000001900)=[{0xe0, 0x92, 0x7, "9b53521627322ff8a6d15c2e142c2ca6c1bc8698a6e3aafe1548b4d8fa9bf79f6783c2fa87539f07fa4223b543b2622a8b6b93b5957990c1136f8e1347f758f6922664f42823743e337dd800275009905d26007abcc442be1fcebe30f575f20b3356b42e6948b08d5e90f002e2f886f3bb56fedf82d337d26e5a1e0ef6edf6a55cd2eaf16910f6e0ac568e59cd5627a1e37817a061d2ea9e9f4575cc0ac8b9bb4300670ec0871b4e9450fbae200fee3e355e1b86e2a053df9fa4f84d2b0d0855c89eb18b0b7e8cc1017e379a1537"}, {0x108, 0x116, 0x8, "f281b88db7c350f36198cc6b68c7e622c0c45e48327f2661e7012f5a25d98da2e1e734af07d8f595fa007d51ef850e93ebc3c3bfd34c645d887999cb9ed6c96acfc9840e8b9ff73594ff537f6d5f9df3968b67ab954048f5f3debf14e91325a54f787a49eff92e005f6bc0ca9dfd6b5ccafd64cc7afd9fd7b9228cfef681b9dab3a60d579931a9f811f11d90ea7d2aa763080e12e49dd45642483105388841cb0cd62c362fd8d78a08a46d7a33c56e96af23661263e4ae60e680cb3d3928a252df75e4b1255e2e45c7417c000483f75664d690594362e27c9ddfcacb15e95246f148e5cc102d12308273b2535255e4fd66779f48"}, {0x18, 0x114, 0x5, "2d2e69c1fb29"}, {0xe0, 0x103, 0x6, "957dbf568d978b2e5510459874387b1b0b23c72a08fbe59d4cb28310dce5374ab4b25acb9166f5cf28a0c64b0850f5c12df2f666296f49acb0b29fefdefbe84e3e439786855c3ea706c59abb6a4231bdf058816db23d7ff766f42dba6bf67cb44bb86daf4faeff7b2f6950a29217b7351bfd0ab086e29b5acb3b2b0c38b430257a5fab0fd42284c5d86bb49789c474957b40f017e009addb3c3cda0542b958d7903c0e308b70e9920363f59c5a03f4c48682063e37ad09bbda41864a75f360ad67d6cfb8750b012fef8b6cc7bc39"}, {0x48, 0x107, 0x9, "7f15d3520d3413c576b0d7e14ac8c49620cf86815234278a28525785859635ffa06e861d3a380ccfe6d984f81ac9807511da12f6d592"}], 0x328}, 0x20004010) r3 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000240)='^&.#!\x00', &(0x7f0000000300)='/dev/video36\x00', &(0x7f0000000340)='}\x00', &(0x7f0000000380)=']\xb4--(!:}*(\x00', &(0x7f00000003c0)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)=':[)$!&&#/\x00'], &(0x7f0000000580)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)='),\x00'], 0x1000) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180), 0x200400, 0x0) ioctl$SIOCX25GFACILITIES(r5, 0x89e2, &(0x7f00000001c0)) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000180)={0x16, @empty, 0x4e20, 0x0, 'rr\x00', 0x10, 0x4, 0x48}, 0x2c) r3 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1096.361431] IPVS: set_ctl: invalid protocol: 22 0.0.0.0:20000 08:53:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect(r0, &(0x7f0000000180)=@can, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$afs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x7f, 0x5, &(0x7f0000000680)=[{&(0x7f0000000300)="5c1490d00a572ca0a25f5687f410296acef3829dc6c807c1cd6f5a2effb754b4c4d7d78af98f49282f1e5fc17cfb6c6b0817f624118912cc58c37649f6d0301b99192bcc7e7de0b488797a69179263cfb667f7005f20517f6b0bb2aba893946412486b751a871a7cdd0f0e3dab27017d8a58a6b6efeea41e3335eb22a38db15e055745bd5491838603187aa09b202972f4fc86fa9520d876bd97e87ae45f87ef525a7361ae21c64f68a94028aebad81c8ef6da152ca7d00b538e65fa42c08778db78bc1e11dd5be75a8ee8561e055ef5c2f2e9146a8891cbf69b22b786b2563a0d73b01afcb0edf16c574fae9ea8a4aeb563f554f8cc", 0xf6, 0xa052}, {&(0x7f0000000400)="9fa1ed153ca6db25db9c830a57dd5dd2424cdb85bcb2f832085425b094d774731ee944cbb8be6eea3db807dfb1574493c0c025c93c26d0ae8c5c07c7419528d54b49b3146a0a7f7e96436eafeafeea869096e01737ea8f043778f69881e30561cd1e2c1c5c2b01064da60c76e4bea19dc67990f079322950ff94d41516db99064ecd3b322fdfbcff3de3c65fe067b7a0beb01d4e919fb31274010ca4fe16c6ccf7f04b81182616ae6ba1a45526e5d16446bb20c884f17ec474ab6f183a269fd8c8bb215743cbf311d85d9c695893d9860f", 0xd1, 0x779b}, {&(0x7f0000000500)="ec8bdf48f719733cbcdf17518cd12158f4397374467f7f00d634e50c36d8c4bf78ba9a84489845c02d9037aaea48e2550eaf8da8065f3858b4b069b44ee7705e8c687cf491c7d706d9140511ee7d524aa1d34f4c87ee6bc7fb28ec6f28e4c7cd583558d219221069fa0177e3ebaceba22f9efc4ea75561", 0x77, 0x7}, {&(0x7f0000000580)="e8c7fde05bff1761a03744d78dee5bbf6c07c1ecb1f9e36be5f5231ef970607ba5c4cb9883797451721f3aa26248b0c110cf8281e4b1fd72dec444fb377f7686d9978ffb01d1cc8a2e9b2e46282d8ddd199f07", 0x53}, {&(0x7f0000000600)="d297922160174937ea8af81acfbbd5a8e201cf8ed3b2579619b7b0f77e7faa10fb62ff28fcfb00291ab69930cccde0141849b855acc3eea0a05e80dccff1af9314339daf3a07b581dfe38bcee8a72ea1c6259d8f4c5e877f979449905e5dc5ed9038e3c610e48ba3dc868a06", 0x6c, 0x4}], 0x802000, &(0x7f0000000700)={[{}, {@dyn}], [{@hash}, {@obj_user={'obj_user', 0x3d, '\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'}}, {@dont_measure}, {@uid_gt}]}) memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) r1 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11d8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000180)={0x16, @empty, 0x4e20, 0x0, 'rr\x00', 0x10, 0x4, 0x48}, 0x2c) r3 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1096.643175] IPVS: set_ctl: invalid protocol: 22 0.0.0.0:20000 08:53:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000216000/0x4000)=nil, 0x4000, 0x1, 0x10, r0, 0xea586000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f00000013c0)=[{&(0x7f0000000180)=""/86, 0x56}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/156, 0x9c}, {&(0x7f0000000200)=""/106, 0x6a}], 0x4, 0x1c0000, 0x1) 08:53:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect(r0, &(0x7f0000000180)=@can, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$afs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x7f, 0x5, &(0x7f0000000680)=[{&(0x7f0000000300)="5c1490d00a572ca0a25f5687f410296acef3829dc6c807c1cd6f5a2effb754b4c4d7d78af98f49282f1e5fc17cfb6c6b0817f624118912cc58c37649f6d0301b99192bcc7e7de0b488797a69179263cfb667f7005f20517f6b0bb2aba893946412486b751a871a7cdd0f0e3dab27017d8a58a6b6efeea41e3335eb22a38db15e055745bd5491838603187aa09b202972f4fc86fa9520d876bd97e87ae45f87ef525a7361ae21c64f68a94028aebad81c8ef6da152ca7d00b538e65fa42c08778db78bc1e11dd5be75a8ee8561e055ef5c2f2e9146a8891cbf69b22b786b2563a0d73b01afcb0edf16c574fae9ea8a4aeb563f554f8cc", 0xf6, 0xa052}, {&(0x7f0000000400)="9fa1ed153ca6db25db9c830a57dd5dd2424cdb85bcb2f832085425b094d774731ee944cbb8be6eea3db807dfb1574493c0c025c93c26d0ae8c5c07c7419528d54b49b3146a0a7f7e96436eafeafeea869096e01737ea8f043778f69881e30561cd1e2c1c5c2b01064da60c76e4bea19dc67990f079322950ff94d41516db99064ecd3b322fdfbcff3de3c65fe067b7a0beb01d4e919fb31274010ca4fe16c6ccf7f04b81182616ae6ba1a45526e5d16446bb20c884f17ec474ab6f183a269fd8c8bb215743cbf311d85d9c695893d9860f", 0xd1, 0x779b}, {&(0x7f0000000500)="ec8bdf48f719733cbcdf17518cd12158f4397374467f7f00d634e50c36d8c4bf78ba9a84489845c02d9037aaea48e2550eaf8da8065f3858b4b069b44ee7705e8c687cf491c7d706d9140511ee7d524aa1d34f4c87ee6bc7fb28ec6f28e4c7cd583558d219221069fa0177e3ebaceba22f9efc4ea75561", 0x77, 0x7}, {&(0x7f0000000580)="e8c7fde05bff1761a03744d78dee5bbf6c07c1ecb1f9e36be5f5231ef970607ba5c4cb9883797451721f3aa26248b0c110cf8281e4b1fd72dec444fb377f7686d9978ffb01d1cc8a2e9b2e46282d8ddd199f07", 0x53}, {&(0x7f0000000600)="d297922160174937ea8af81acfbbd5a8e201cf8ed3b2579619b7b0f77e7faa10fb62ff28fcfb00291ab69930cccde0141849b855acc3eea0a05e80dccff1af9314339daf3a07b581dfe38bcee8a72ea1c6259d8f4c5e877f979449905e5dc5ed9038e3c610e48ba3dc868a06", 0x6c, 0x4}], 0x802000, &(0x7f0000000700)={[{}, {@dyn}], [{@hash}, {@obj_user={'obj_user', 0x3d, '\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'}}, {@dont_measure}, {@uid_gt}]}) memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) r1 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xdf, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="b4182187a01381a854f559218abe5f10261984d89328e3546785703b3159b4e01f374997478626d10f8bb6d697", 0x2d, 0xee5c}], 0x10a2011, &(0x7f00000001c0)={[{@nodiscard}, {@discard_size={'discard', 0x3d, 0xc55}}, {}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/dsp\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/dsp\x00'}}]}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR$i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x2) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000216000/0x4000)=nil, 0x4000, 0x1, 0x10, r0, 0xea586000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) preadv(r3, &(0x7f0000000540)=[{&(0x7f0000000180)=""/222, 0xde}, {&(0x7f0000000300)=""/208, 0xd0}, {&(0x7f0000000400)=""/55, 0x37}, {&(0x7f0000000440)=""/145, 0x91}, {&(0x7f0000000500)}], 0x5, 0x4, 0x8) 08:53:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0xc01c64ae, &(0x7f0000000180)={0xc2, 0xa29, 0x0, 0x0, 0x80000001, 0x81, 0x276}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0xffff, 0x2]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x30}}, 0x40811) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x4, 0x8, 0x0, 0x32c3547, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x1f, 0x3000}, 0x8002, 0x3, 0x81, 0x1, 0x0, 0x80000001, 0x200, 0x0, 0x9, 0x0, 0x40}, 0x0, 0x0, r0, 0x3) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c456000002ec9e4f97765ce27b9820600000000000000820100050000000402030000000020000600b3d7c52ebf53cefd10c125f1ba085b13c84ed24bc6cb00001e5fe100093f64e7be7cd72615ffffbd000000110000000d60395a7088d700000000000000"], 0xd8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000216000/0x4000)=nil, 0x4000, 0x1, 0x10, r0, 0xea586000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8000, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x78, 0x4, 0x6, 0x801, 0x0, 0x0, {0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x24014}, 0x50) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0xfe, 0x0, 0xc54, 0x164, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0x82}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11d8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'system.', '\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'}, &(0x7f0000000200)=':@}/\x00', 0x5, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b90100060000000000000082200005000000040203007aa8352b8b35e71debe47771da86b600000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba0881b76357d8574d0f7cc08dfffd518800001e5fe10009e600f80000ffffffffff0300000011000000"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) memfd_create(&(0x7f0000000240)='^.\x00', 0x7) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:08 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={0x1, &(0x7f0000000180)="a0cee100985ddc12ab705d1f7f2e509950d3de2d9bc9417f3fb1f26816baa81dc3b96285c1b759cf851ba2afe66d9457986876d136dabc730840f5baa2bd7e50c82e5f74b1950677afb41765f279dc53329ee2baea98eed329f9162919a3f8d74206c1d40a4946051dd8568daa6d7933f5d2b16f8e6e2da148b6042865e52a09e0deff7b8a81697fcdf644ee57f76d7b59dbbed01ec053693a3c28ceeb3941bd01ba4a9f71a2ea1c0278997c3fb682913977fa749651228c0da12a6f7f7b20581840fa395316183489b78581e4c6dc825f8f2cb1bf843ea9161d1bd8e93d201badd4712513d7adf45f492b5fd8f8ce6c9704e96ebb"}, 0x20) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000340), 0x80, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x0, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8e402, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'system.', '\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'}, &(0x7f0000000200)=':@}/\x00', 0x5, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b90100060000000000000082200005000000040203007aa8352b8b35e71debe47771da86b600000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba0881b76357d8574d0f7cc08dfffd518800001e5fe10009e600f80000ffffffffff0300000011000000"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) memfd_create(&(0x7f0000000240)='^.\x00', 0x7) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000180)=0x100000001) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x0, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x0, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:08 executing program 0 (fault-call:3 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r2, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c6ac200002e0100000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088c700"/104], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = gettid() r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240), 0x4901, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x2, 0x9, 0x0, 0x1, 0x0, 0x8, 0x18020, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x9, 0x5e53}, 0x46c4, 0x0, 0x7, 0x6, 0x9, 0x0, 0x6, 0x0, 0x20}, r3, 0x0, r1, 0x8) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r5, 0x0) 08:53:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000008c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4d0, 0x0, 0x0, 0x158, 0x98, 0x340, 0x438, 0x438, 0x438, 0x438, 0x438, 0x6, &(0x7f0000000840), {[{{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x3}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x32}, 0xffffffff, 0x0, 'macvtap0\x00', 'macvlan0\x00', {0xff}, {}, 0x73, 0x1, 0x26}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@inet=@socket3={{0x28}}, @inet=@rpfilter={{0x28}, {0xc}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="f0984351dc4f", 0x3, 0xa, [0xc, 0x9, 0x8, 0x2, 0x5, 0xc, 0x1e, 0x28, 0x2e, 0x28, 0x35, 0x9, 0x3, 0x1f, 0x19, 0x2d], 0x2, 0x8, 0x5}}}, {{@ip={@empty, @local, 0xff, 0xff000000, 'geneve1\x00', 'team0\x00', {}, {}, 0x4, 0x0, 0x2}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x412a572a, 0x1, @rand_addr=0x64010101, 0x4e24}}}, {{@ip={@rand_addr=0x64010101, @private=0xa010100, 0xff000000, 0xffffff00, 'netpci0\x00', 'syz_tun\x00', {}, {}, 0x33, 0x2, 0x10}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@set={{0x40}, {{0x4, [0x2, 0x0, 0x2, 0xc, 0x1], 0x4, 0x4}}}, @common=@socket0={{0x20}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x530) r3 = syz_mount_image$hfsplus(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x4, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000300)="20015db01d45eacb33310fef6d048e52de87ee5a166def061d18b6b7c97b7752ccde8dc057ecff348c9ce797da133018dfd17c5d5893359aaabe5d14dad78235ad77c8e5cfe0143c0e65d4e9a2be4ffdf97d64242690cd556206413c2ebe37c84ef3787f55c0c21dac2599b6000ed1fa46958ecf08e593704bc9be580103c752c61a352bf58d7323298e853392a682b85e2d0e3f0bdbf5c26c9bc7a2d84a20ec4e60236fbaaaad095bcfdc", 0xab, 0x3}, {&(0x7f00000003c0)="bf3c63db3ac0a34b760f0b648b426ae4052383397f083ef26e1f4cbf3330f5710c59e0768f5e881da85b8a54922f9b12c8e8ffff660dc9bf6455efa41afff0120992430b592b64ec8fe7729ce1758fb0eb3b0aeb3153c0bb8c5998b12713d1ec8a3fbb84611b1adc47075f324885477e", 0x70, 0x1}, {&(0x7f0000000240)="c98813d648aac7ec1cb16ceef3b540b4cc4ddafff0ced935a3", 0x19, 0x7f}, {&(0x7f0000000440)="00c4c145178c46df3fb705bad0af17a5caa3447cce4ec1abc399d726d4cd11ba58a12037131c80915a3a3f58b1f1d51fafe019b2cad1889b4fa4122eda7669a214e5ab704186bbede69b83fba0c572448a5bf88cacc13f0b0ebb965d5e4239920c912f418d68a83be140d96b0173960b046e0081a7c5632a09dbd57e24dca5c40f8b4b1b0ed4a45cff97198ba1944b93988fcb3b54890db20693348da79312d52ddd6f1b6fb1fba2f499be84a4b7e0dc802dd9e13a1a9ee77ab856e3061fc435ba474b94afe226b4d4aac6b732ba70728275ed40708e8ab757", 0xd9, 0x100000001}, {&(0x7f0000000540), 0x0, 0x6}, {&(0x7f0000000580)="1f", 0x1, 0x4}], 0x4408, &(0x7f0000000680)={[{@creator={'creator', 0x3d, "1774247b"}}, {@uid={'uid', 0x3d, 0xee00}}, {}, {@gid={'gid', 0x3d, 0xee00}}, {@type={'type', 0x3d, "3d1bc131"}}, {@uid={'uid', 0x3d, 0xee01}}, {}, {@gid={'gid', 0x3d, 0xee01}}, {@type={'type', 0x3d, "6df9c310"}}], [{@obj_user={'obj_user', 0x3d, '\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'}}]}) renameat(r1, &(0x7f0000000180)='./file0\x00', r3, &(0x7f0000000780)='./file0\x00') r4 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x20, 0x7, 0x0, 0x1, 0x0, 0x401, 0x0, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000540), 0x3}, 0x201, 0x3, 0x1, 0x1e, 0x9, 0xc495, 0x9, 0x0, 0x40, 0x0, 0x2}, 0x0, 0xc, r1, 0x0) [ 1098.455487] FAULT_INJECTION: forcing a failure. [ 1098.455487] name failslab, interval 1, probability 0, space 0, times 0 08:53:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1098.526643] CPU: 1 PID: 2383 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1098.534457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.543812] Call Trace: [ 1098.546413] dump_stack+0x1fc/0x2ef [ 1098.550059] should_fail.cold+0xa/0xf [ 1098.553917] ? setup_fault_attr+0x200/0x200 [ 1098.558247] ? lock_acquire+0x170/0x3c0 [ 1098.562238] __should_failslab+0x115/0x180 [ 1098.566483] should_failslab+0x5/0x10 [ 1098.570291] kmem_cache_alloc+0x277/0x370 [ 1098.574451] getname_flags+0xce/0x590 [ 1098.578435] do_sys_open+0x26c/0x520 [ 1098.582169] ? filp_open+0x70/0x70 [ 1098.585716] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1098.591089] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1098.596204] ? do_syscall_64+0x21/0x620 [ 1098.600187] do_syscall_64+0xf9/0x620 [ 1098.603993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.609265] RIP: 0033:0x4665d9 08:53:09 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:53:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1098.612457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.631355] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1098.639091] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1098.646365] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1098.653639] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.660908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.668269] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 08:53:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053ce7d10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) 08:53:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000180)={0x20000000}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0), 0x10402, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000300)={"6ce5c437d8e377861c7290e52b04dc40", 0x0, 0x0, {0x81000, 0x4}, {0x9, 0x7}, 0x1ff, [0x40, 0x8e6, 0xfffffffffffffffe, 0x8, 0xbb, 0x84, 0x1f, 0x6, 0x7, 0x4, 0x1, 0x0, 0x0, 0x4, 0x80000001, 0x80000000]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{r3}, r4, 0x0, @inherit={0x0, 0xfffffffffffffffc}, @devid}) r5 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r5, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) splice(r6, 0x0, r7, 0x0, 0x8000, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x2010, r7, 0x34318000) 08:53:09 executing program 0 (fault-call:3 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:53:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x2, &(0x7f0000000180)={0xcb099900}) [ 1098.919217] FAULT_INJECTION: forcing a failure. [ 1098.919217] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1098.931069] CPU: 1 PID: 2425 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1098.931079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.931084] Call Trace: [ 1098.931103] dump_stack+0x1fc/0x2ef [ 1098.931122] should_fail.cold+0xa/0xf [ 1098.931143] ? setup_fault_attr+0x200/0x200 [ 1098.931156] ? _parse_integer+0x132/0x180 [ 1098.967176] ? mark_held_locks+0xf0/0xf0 [ 1098.971255] __alloc_pages_nodemask+0x239/0x2890 [ 1098.976017] ? __might_fault+0x192/0x1d0 [ 1098.980086] ? _copy_from_user+0xd2/0x130 [ 1098.984275] ? __lock_acquire+0x6de/0x3ff0 [ 1098.988520] ? lock_downgrade+0x720/0x720 [ 1098.992762] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1098.997617] ? check_preemption_disabled+0x41/0x280 [ 1099.002650] ? proc_fail_nth_write+0x95/0x1d0 [ 1099.007153] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1099.012101] cache_grow_begin+0xa4/0x8a0 [ 1099.016168] ? setup_fault_attr+0x200/0x200 [ 1099.020496] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 1099.025274] cache_alloc_refill+0x273/0x340 [ 1099.029605] kmem_cache_alloc+0x346/0x370 [ 1099.033763] getname_flags+0xce/0x590 [ 1099.037577] do_sys_open+0x26c/0x520 [ 1099.041304] ? filp_open+0x70/0x70 [ 1099.044863] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1099.050235] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1099.055261] ? do_syscall_64+0x21/0x620 [ 1099.059241] do_syscall_64+0xf9/0x620 [ 1099.063053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.068242] RIP: 0033:0x4665d9 [ 1099.071436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.090337] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1099.098052] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1099.105327] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1099.112602] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 08:53:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180), 0x0, 0x800, 0x0, 0xffffffffffffffff}) write(r1, &(0x7f0000000200)="78ef1150ffa3d7625026e59693ce91693a", 0x11) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x5421, &(0x7f0000000180)={0xcb099900}) 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x5450, &(0x7f0000000180)={0xcb099900}) 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x5451, &(0x7f0000000180)={0xcb099900}) 08:53:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1099.119871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.127143] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 08:53:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:53:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800000, 0x20010, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x5452, &(0x7f0000000180)={0xcb099900}) 08:53:09 executing program 0 (fault-call:3 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)='./file0\x00', 0x8, 0x3) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x181001, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x5460, &(0x7f0000000180)={0xcb099900}) [ 1099.352129] FAULT_INJECTION: forcing a failure. [ 1099.352129] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.410226] CPU: 1 PID: 2462 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1099.418138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.427495] Call Trace: [ 1099.430096] dump_stack+0x1fc/0x2ef [ 1099.433740] should_fail.cold+0xa/0xf [ 1099.437556] ? setup_fault_attr+0x200/0x200 [ 1099.441900] ? lock_acquire+0x170/0x3c0 [ 1099.445889] __should_failslab+0x115/0x180 [ 1099.450137] should_failslab+0x5/0x10 [ 1099.453952] kmem_cache_alloc_trace+0x284/0x380 [ 1099.458633] apparmor_file_alloc_security+0x394/0xad0 [ 1099.463830] ? apparmor_file_receive+0x160/0x160 [ 1099.468587] ? __alloc_file+0x21/0x330 [ 1099.472507] security_file_alloc+0x40/0x90 [ 1099.476752] __alloc_file+0xc9/0x330 [ 1099.480477] alloc_empty_file+0x6d/0x170 [ 1099.484638] path_openat+0xe9/0x2df0 [ 1099.488363] ? __lock_acquire+0x6de/0x3ff0 [ 1099.492612] ? check_preemption_disabled+0x41/0x280 [ 1099.497633] ? path_lookupat+0x8d0/0x8d0 [ 1099.501702] ? mark_held_locks+0xf0/0xf0 [ 1099.505773] ? mark_held_locks+0xf0/0xf0 [ 1099.509852] ? proc_fail_nth_write+0x95/0x1d0 [ 1099.514356] do_filp_open+0x18c/0x3f0 [ 1099.518161] ? may_open_dev+0xf0/0xf0 [ 1099.521964] ? __alloc_fd+0x28d/0x570 [ 1099.525866] ? lock_downgrade+0x720/0x720 [ 1099.530020] ? lock_acquire+0x170/0x3c0 [ 1099.534432] ? __alloc_fd+0x34/0x570 [ 1099.538213] ? do_raw_spin_unlock+0x171/0x230 [ 1099.542722] ? _raw_spin_unlock+0x29/0x40 [ 1099.546962] ? __alloc_fd+0x28d/0x570 [ 1099.550775] do_sys_open+0x3b3/0x520 [ 1099.554496] ? filp_open+0x70/0x70 [ 1099.558135] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1099.563509] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1099.568528] ? do_syscall_64+0x21/0x620 [ 1099.572509] do_syscall_64+0xf9/0x620 [ 1099.576322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.581683] RIP: 0033:0x4665d9 [ 1099.584873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x40049409, &(0x7f0000000180)={0xcb099900}) 08:53:09 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x4020940d, &(0x7f0000000180)={0xcb099900}) 08:53:10 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0045878, &(0x7f0000000180)={0xcb099900}) 08:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:53:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, 0x0, 0x0) [ 1099.603952] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1099.611663] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1099.619139] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1099.626414] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.633686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.640964] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 08:53:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f00000000c0)) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r2, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) 08:53:10 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0045878, &(0x7f0000000180)={0xcb099900}) 08:53:10 executing program 0 (fault-call:3 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0x4, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2000, 0x0) ioctl$SNDCTL_DSP_SYNC(r5, 0x5001, 0x0) splice(r3, 0x0, r4, 0x0, 0x8000, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r6, &(0x7f0000000040)={0x7}, 0x7) ioctl$VIDIOC_G_CTRL(r6, 0xc008561b, &(0x7f0000000180)={0x7, 0xc8b}) 08:53:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, 0x0, 0x0) [ 1099.805157] FAULT_INJECTION: forcing a failure. [ 1099.805157] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.820262] CPU: 1 PID: 2495 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1099.828087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.837448] Call Trace: [ 1099.840064] dump_stack+0x1fc/0x2ef [ 1099.843708] should_fail.cold+0xa/0xf [ 1099.847532] ? setup_fault_attr+0x200/0x200 [ 1099.851861] ? lock_acquire+0x170/0x3c0 [ 1099.855954] __should_failslab+0x115/0x180 [ 1099.860202] should_failslab+0x5/0x10 [ 1099.864009] kmem_cache_alloc_trace+0x284/0x380 [ 1099.868689] apparmor_file_alloc_security+0x394/0xad0 [ 1099.873887] ? apparmor_file_receive+0x160/0x160 [ 1099.878662] ? __alloc_file+0x21/0x330 [ 1099.882558] security_file_alloc+0x40/0x90 [ 1099.886800] __alloc_file+0xc9/0x330 [ 1099.890521] alloc_empty_file+0x6d/0x170 [ 1099.894586] path_openat+0xe9/0x2df0 [ 1099.898303] ? __lock_acquire+0x6de/0x3ff0 [ 1099.902546] ? check_preemption_disabled+0x41/0x280 [ 1099.907568] ? path_lookupat+0x8d0/0x8d0 [ 1099.911642] ? mark_held_locks+0xf0/0xf0 [ 1099.915737] ? proc_fail_nth_write+0x95/0x1d0 [ 1099.920243] do_filp_open+0x18c/0x3f0 [ 1099.924065] ? may_open_dev+0xf0/0xf0 [ 1099.927888] ? __alloc_fd+0x28d/0x570 [ 1099.931704] ? lock_downgrade+0x720/0x720 [ 1099.935860] ? lock_acquire+0x170/0x3c0 [ 1099.939836] ? __alloc_fd+0x34/0x570 [ 1099.943554] ? do_raw_spin_unlock+0x171/0x230 [ 1099.948053] ? _raw_spin_unlock+0x29/0x40 [ 1099.952261] ? __alloc_fd+0x28d/0x570 [ 1099.956076] do_sys_open+0x3b3/0x520 [ 1099.959795] ? filp_open+0x70/0x70 [ 1099.963351] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1099.968725] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1099.973757] ? do_syscall_64+0x21/0x620 [ 1099.977739] do_syscall_64+0xf9/0x620 [ 1099.981546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.986736] RIP: 0033:0x4665d9 08:53:10 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0189436, &(0x7f0000000180)={0xcb099900}) 08:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:53:10 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205647, &(0x7f0000000180)={0xcb099900}) 08:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 08:53:10 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205667, &(0x7f0000000180)={0xcb099900}) 08:53:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, 0x0, 0x0) 08:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)='./file0\x00', 0x8, 0x3) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x181001, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1099.990047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.008964] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1100.016678] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1100.023967] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1100.031240] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.038509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1100.045791] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 08:53:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000200)={'team_slave_0\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) read$char_usb(r0, &(0x7f0000000300)=""/4096, 0x1000) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) 08:53:10 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc020660b, &(0x7f0000000180)={0xcb099900}) 08:53:10 executing program 0 (fault-call:3 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180), 0x4) 08:53:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xd4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x10000, 0xfffe}, 0x0, 0x10000, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:10 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0285628, &(0x7f0000000180)={0xcb099900}) 08:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f00000000c0)) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r2, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) 08:53:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180), 0x4) [ 1100.257393] FAULT_INJECTION: forcing a failure. [ 1100.257393] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.335566] CPU: 1 PID: 2530 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1100.343438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.352795] Call Trace: [ 1100.355398] dump_stack+0x1fc/0x2ef [ 1100.359084] should_fail.cold+0xa/0xf [ 1100.362911] ? setup_fault_attr+0x200/0x200 [ 1100.367240] ? lock_acquire+0x170/0x3c0 [ 1100.371229] __should_failslab+0x115/0x180 [ 1100.375467] should_failslab+0x5/0x10 [ 1100.379276] kmem_cache_alloc_trace+0x284/0x380 [ 1100.383948] ? __mutex_unlock_slowpath+0xea/0x610 [ 1100.388801] seq_create_client1+0x4c/0x4c0 [ 1100.393051] snd_seq_open+0x57/0x590 [ 1100.396773] ? snd_seq_release+0xe0/0xe0 [ 1100.400840] snd_open+0x212/0x440 [ 1100.404306] ? snd_register_device+0x420/0x420 [ 1100.408899] chrdev_open+0x266/0x770 [ 1100.412620] ? lockref_get+0x11/0x50 [ 1100.416363] ? __register_chrdev+0x400/0x400 [ 1100.420785] ? check_preemption_disabled+0x41/0x280 [ 1100.425814] do_dentry_open+0x4aa/0x1160 [ 1100.429887] ? __register_chrdev+0x400/0x400 [ 1100.434304] ? inode_permission.part.0+0x10c/0x450 [ 1100.439238] ? chown_common+0x550/0x550 [ 1100.443220] ? inode_permission+0x3d/0x140 [ 1100.447503] path_openat+0x793/0x2df0 [ 1100.451322] ? path_lookupat+0x8d0/0x8d0 [ 1100.455385] ? mark_held_locks+0xf0/0xf0 [ 1100.459460] do_filp_open+0x18c/0x3f0 [ 1100.463270] ? may_open_dev+0xf0/0xf0 [ 1100.467084] ? lock_downgrade+0x720/0x720 [ 1100.471245] ? lock_acquire+0x170/0x3c0 [ 1100.475220] ? __alloc_fd+0x34/0x570 [ 1100.478935] ? do_raw_spin_unlock+0x171/0x230 [ 1100.483432] ? _raw_spin_unlock+0x29/0x40 [ 1100.487582] ? __alloc_fd+0x28d/0x570 [ 1100.491387] do_sys_open+0x3b3/0x520 [ 1100.495107] ? filp_open+0x70/0x70 [ 1100.498660] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1100.504070] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1100.509092] ? do_syscall_64+0x21/0x620 [ 1100.513075] do_syscall_64+0xf9/0x620 [ 1100.516894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.522086] RIP: 0033:0x4665d9 [ 1100.525279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.544195] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1100.551916] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1100.559192] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1100.566466] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.573737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:53:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/56, 0x38}], 0x1, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f00000000c0)) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r2, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) 08:53:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) splice(r4, 0x0, r5, 0x0, 0x8000, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r3, 0x5000940f, &(0x7f0000000300)={{r5}, "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f00000001c0)=ANY=[@ANYRES64=0x0, @ANYBLOB="fcffffffffffffff0800000000000000ff07000000000000080000000000000000060000001f0000001f000000a60d0000ef3300000000000001809fdd1e009d3022ccffffffffffff04000000000000000800"/112]) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r6 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r6, 0x8010661b, &(0x7f0000000100)) sendfile(r1, r6, &(0x7f0000000180)=0x254f, 0x73e) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:11 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0285629, &(0x7f0000000180)={0xcb099900}) [ 1100.581015] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 08:53:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x5, 0x6, 0x100, 0x44, r0, 0x4, '\x00', 0x0, r0, 0x5, 0x3, 0x4}, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@remote, @in=@local}}, {{@in=@empty}, 0x0, @in6=@private0}}, &(0x7f0000000200)=0xe8) mmap(&(0x7f0000471000/0x2000)=nil, 0x2000, 0x1000004, 0x50, r2, 0x98c30000) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r4, 0x0) 08:53:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000180)={0x20000000}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0), 0x10402, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000300)={"6ce5c437d8e377861c7290e52b04dc40", 0x0, 0x0, {0x81000, 0x4}, {0x9, 0x7}, 0x1ff, [0x40, 0x8e6, 0xfffffffffffffffe, 0x8, 0xbb, 0x84, 0x1f, 0x6, 0x7, 0x4, 0x1, 0x0, 0x0, 0x4, 0x80000001, 0x80000000]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000400)={{r3}, r4, 0x0, @inherit={0x0, 0xfffffffffffffffc}, @devid}) r5 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r5, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) splice(r6, 0x0, r7, 0x0, 0x8000, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x2010, r7, 0x34318000) 08:53:11 executing program 0 (fault-call:3 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180), 0x4) 08:53:11 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0585609, &(0x7f0000000180)={0xcb099900}) 08:53:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r2, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c6ac200002e0100000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088c700"/104], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = gettid() r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240), 0x4901, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x2, 0x9, 0x0, 0x1, 0x0, 0x8, 0x18020, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x9, 0x5e53}, 0x46c4, 0x0, 0x7, 0x6, 0x9, 0x0, 0x6, 0x0, 0x20}, r3, 0x0, r1, 0x8) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r5, 0x0) 08:53:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) splice(r4, 0x0, r5, 0x0, 0x8000, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x6, 0xc3, 0x4, 0x1, 0x0, 0x59, 0x8000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000001c0), 0x4}, 0x100, 0x68, 0x6, 0x3, 0x9, 0x400, 0x0, 0x0, 0xc7bc, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, r4, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r3, 0x40045010, &(0x7f0000000180)=0x7) 08:53:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:11 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc058560f, &(0x7f0000000180)={0xcb099900}) [ 1100.828783] FAULT_INJECTION: forcing a failure. [ 1100.828783] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.875520] CPU: 0 PID: 2580 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1100.883369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.892727] Call Trace: [ 1100.895326] dump_stack+0x1fc/0x2ef [ 1100.898962] should_fail.cold+0xa/0xf [ 1100.902775] ? setup_fault_attr+0x200/0x200 [ 1100.907105] ? lock_acquire+0x170/0x3c0 [ 1100.911091] __should_failslab+0x115/0x180 [ 1100.915336] should_failslab+0x5/0x10 [ 1100.919144] kmem_cache_alloc_trace+0x284/0x380 08:53:11 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0585611, &(0x7f0000000180)={0xcb099900}) [ 1100.923818] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1100.928840] snd_seq_pool_new+0x40/0x240 [ 1100.932912] seq_create_client1+0x64/0x4c0 [ 1100.937162] snd_seq_open+0x57/0x590 [ 1100.940880] ? snd_seq_release+0xe0/0xe0 [ 1100.944947] snd_open+0x212/0x440 [ 1100.948401] ? snd_register_device+0x420/0x420 [ 1100.952979] chrdev_open+0x266/0x770 [ 1100.956696] ? lockref_get+0x11/0x50 [ 1100.960412] ? __register_chrdev+0x400/0x400 [ 1100.964822] ? check_preemption_disabled+0x41/0x280 [ 1100.969860] do_dentry_open+0x4aa/0x1160 [ 1100.973920] ? __register_chrdev+0x400/0x400 [ 1100.978327] ? inode_permission.part.0+0x10c/0x450 [ 1100.983248] ? chown_common+0x550/0x550 [ 1100.987216] ? inode_permission+0x3d/0x140 [ 1100.991459] path_openat+0x793/0x2df0 [ 1100.995270] ? path_lookupat+0x8d0/0x8d0 [ 1100.999334] ? mark_held_locks+0xf0/0xf0 [ 1101.003410] do_filp_open+0x18c/0x3f0 [ 1101.007212] ? may_open_dev+0xf0/0xf0 [ 1101.011023] ? lock_downgrade+0x720/0x720 [ 1101.015178] ? lock_acquire+0x170/0x3c0 [ 1101.019162] ? __alloc_fd+0x34/0x570 [ 1101.022883] ? do_raw_spin_unlock+0x171/0x230 [ 1101.027386] ? _raw_spin_unlock+0x29/0x40 [ 1101.031549] ? __alloc_fd+0x28d/0x570 [ 1101.035360] do_sys_open+0x3b3/0x520 [ 1101.039075] ? filp_open+0x70/0x70 [ 1101.042623] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1101.047987] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1101.053003] ? do_syscall_64+0x21/0x620 [ 1101.056979] do_syscall_64+0xf9/0x620 [ 1101.060786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.065973] RIP: 0033:0x4665d9 [ 1101.069158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.088071] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1101.095784] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1101.103050] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1101.110313] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1101.117580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1101.124845] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 08:53:11 executing program 3 (fault-call:5 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x5, 0x6, 0x100, 0x44, r0, 0x4, '\x00', 0x0, r0, 0x5, 0x3, 0x4}, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@remote, @in=@local}}, {{@in=@empty}, 0x0, @in6=@private0}}, &(0x7f0000000200)=0xe8) mmap(&(0x7f0000471000/0x2000)=nil, 0x2000, 0x1000004, 0x50, r2, 0x98c30000) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r4, 0x0) 08:53:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f000037b000/0x2000)=nil, 0x2000, 0x0, 0x100033, r1, 0x150f0000) open(&(0x7f0000000480)='./file0\x00', 0x200000, 0x1c9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0xfffd, 0x0, 0x0, 0x0, 0x40}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00006e1000/0x2000)=nil, 0x2000, 0x3, 0x10, r3, 0x7a059000) r4 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r4, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b01004ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, 0x17, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}]}, 0x70}, 0x1, 0x0, 0x0, 0x4090}, 0xc000) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = dup3(r3, r0, 0x80000) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x9, 0x7, 0x4, 0x8, 0x0, 0x43, 0xa2004, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000340), 0xb}, 0x200, 0x2040000000000000, 0xfffffbff, 0x7, 0x0, 0x9, 0x8, 0x0, 0xd3, 0x0, 0x38}, 0x0, 0x2, r6, 0x8) r7 = syz_open_dev$vcsu(&(0x7f0000005140), 0x7ff, 0x2) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000005180), &(0x7f00000051c0)=0x4) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x3, 0x9, 0x1b, 0x0, "4273fe578f34eea511a0799ac10791b6d5e23acdb3e7e1a7f3ca0327059ba7c748bb7a366f7def97c16853dc3d644316321b49728efb6d1162481492c84db95e", "a02d0a55f2911aa67b4713fa93577614533170bb4db47e73e2e7390d2ca1e434", [0x6, 0x4]}) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r5, 0x0) 08:53:11 executing program 0 (fault-call:3 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206012d000000000000000000030000000000000069746d61703a697000eb4805000400000000000900020073797a3000000000240007800c00020200000000000000000c000180080001c21cf8c400080006400000200a05000500020000000500010006"], 0x1}, 0x8}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4f0926e) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) r5 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r6 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r6, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1101.370796] FAULT_INJECTION: forcing a failure. [ 1101.370796] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.394035] FAULT_INJECTION: forcing a failure. [ 1101.394035] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.410572] CPU: 1 PID: 2609 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1101.418389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.427754] Call Trace: [ 1101.430370] dump_stack+0x1fc/0x2ef [ 1101.434010] should_fail.cold+0xa/0xf [ 1101.437833] ? setup_fault_attr+0x200/0x200 [ 1101.442158] ? lock_acquire+0x170/0x3c0 [ 1101.446149] __should_failslab+0x115/0x180 [ 1101.450394] should_failslab+0x5/0x10 [ 1101.454205] kmem_cache_alloc_trace+0x284/0x380 [ 1101.456308] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1101.458888] ? seq_create_client1+0x281/0x4c0 [ 1101.458917] snd_seq_fifo_new+0x3f/0x270 [ 1101.458933] snd_seq_open+0x46a/0x590 [ 1101.458946] ? snd_seq_release+0xe0/0xe0 [ 1101.458964] snd_open+0x212/0x440 [ 1101.487335] ? snd_register_device+0x420/0x420 [ 1101.491928] chrdev_open+0x266/0x770 [ 1101.495645] ? lockref_get+0x11/0x50 [ 1101.499359] ? __register_chrdev+0x400/0x400 [ 1101.503775] ? check_preemption_disabled+0x41/0x280 [ 1101.505555] FAULT_INJECTION: forcing a failure. [ 1101.505555] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.508808] do_dentry_open+0x4aa/0x1160 [ 1101.508826] ? __register_chrdev+0x400/0x400 [ 1101.508846] ? inode_permission.part.0+0x10c/0x450 [ 1101.508859] ? chown_common+0x550/0x550 [ 1101.508874] ? inode_permission+0x3d/0x140 [ 1101.508898] path_openat+0x793/0x2df0 [ 1101.508922] ? path_lookupat+0x8d0/0x8d0 [ 1101.508940] ? mark_held_locks+0xf0/0xf0 [ 1101.508961] do_filp_open+0x18c/0x3f0 [ 1101.508974] ? may_open_dev+0xf0/0xf0 [ 1101.508998] ? lock_downgrade+0x720/0x720 [ 1101.565705] ? lock_acquire+0x170/0x3c0 [ 1101.569691] ? __alloc_fd+0x34/0x570 [ 1101.573408] ? do_raw_spin_unlock+0x171/0x230 [ 1101.577905] ? _raw_spin_unlock+0x29/0x40 [ 1101.582054] ? __alloc_fd+0x28d/0x570 [ 1101.585865] do_sys_open+0x3b3/0x520 [ 1101.589678] ? filp_open+0x70/0x70 [ 1101.593226] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1101.598608] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1101.603631] ? do_syscall_64+0x21/0x620 [ 1101.607608] do_syscall_64+0xf9/0x620 [ 1101.611418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.616616] RIP: 0033:0x4665d9 [ 1101.619812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.638717] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1101.646431] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1101.653702] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1101.660979] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 08:53:11 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc058565d, &(0x7f0000000180)={0xcb099900}) 08:53:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x7}, 0x7) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x30, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_SCAN_SUPP_RATES={0x8, 0x7d, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x4}]}]}, 0x30}}, 0x4000000) sendmsg$NL80211_CMD_PROBE_CLIENT(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r5, 0x1, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 08:53:11 executing program 5 (fault-call:5 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00', 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0), 0x7493c0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) [ 1101.668244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1101.675507] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 [ 1101.682817] CPU: 0 PID: 2619 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1101.690625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.699986] Call Trace: [ 1101.702600] dump_stack+0x1fc/0x2ef [ 1101.706249] should_fail.cold+0xa/0xf [ 1101.710069] ? setup_fault_attr+0x200/0x200 [ 1101.714406] ? lock_acquire+0x1ec/0x3c0 [ 1101.718398] __should_failslab+0x115/0x180 [ 1101.722731] should_failslab+0x5/0x10 [ 1101.726552] kmem_cache_alloc+0x277/0x370 [ 1101.730714] getname_flags+0xce/0x590 [ 1101.734535] __x64_sys_execveat+0xce/0x120 [ 1101.738781] do_syscall_64+0xf9/0x620 [ 1101.742601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.747788] RIP: 0033:0x4665d9 [ 1101.750972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.769949] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1101.777648] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1101.784902] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1101.792170] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1101.799459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1101.806719] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 08:53:12 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xf000000}) [ 1101.836010] CPU: 0 PID: 2606 Comm: syz-executor.3 Not tainted 4.19.196-syzkaller #0 [ 1101.843833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.853192] Call Trace: [ 1101.855796] dump_stack+0x1fc/0x2ef [ 1101.859452] should_fail.cold+0xa/0xf [ 1101.863259] ? setup_fault_attr+0x200/0x200 [ 1101.867581] ? lock_acquire+0x170/0x3c0 [ 1101.871561] __should_failslab+0x115/0x180 [ 1101.875803] should_failslab+0x5/0x10 [ 1101.879683] kmem_cache_alloc_trace+0x284/0x380 [ 1101.884353] xskq_create+0x44/0x190 [ 1101.887981] xsk_setsockopt+0x44d/0x5a0 [ 1101.891985] ? xsk_sendmsg+0xfa0/0xfa0 [ 1101.895872] ? aa_af_perm+0x230/0x230 [ 1101.899692] __sys_setsockopt+0x14d/0x240 [ 1101.903841] ? kernel_accept+0x310/0x310 [ 1101.907905] ? fput+0x2b/0x190 [ 1101.911095] ? ksys_write+0x1c8/0x2a0 [ 1101.914905] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1101.920273] __x64_sys_setsockopt+0xba/0x150 [ 1101.924683] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1101.929263] do_syscall_64+0xf9/0x620 [ 1101.933076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.938257] RIP: 0033:0x4665d9 [ 1101.941447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.960345] RSP: 002b:00007f441ce96188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1101.968047] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1101.975328] RDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000004 08:53:12 executing program 0 (fault-call:3 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) [ 1101.982604] RBP: 00007f441ce961d0 R08: 0000000000000004 R09: 0000000000000000 [ 1101.989954] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 1101.997223] R13: 00007ffe341c31bf R14: 00007f441ce96300 R15: 0000000000022000 08:53:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) splice(r2, 0x0, r3, 0x0, 0x8000, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/19, 0x13}], 0x1, 0x10, 0x8) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r4, 0x0) 08:53:12 executing program 3 (fault-call:5 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1102.129365] FAULT_INJECTION: forcing a failure. [ 1102.129365] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1102.141582] CPU: 1 PID: 2635 Comm: syz-executor.3 Not tainted 4.19.196-syzkaller #0 [ 1102.149480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.158850] Call Trace: [ 1102.161450] dump_stack+0x1fc/0x2ef [ 1102.165091] should_fail.cold+0xa/0xf [ 1102.168904] ? lock_acquire+0x170/0x3c0 [ 1102.172887] ? setup_fault_attr+0x200/0x200 [ 1102.177213] FAULT_INJECTION: forcing a failure. [ 1102.177213] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.188417] __alloc_pages_nodemask+0x239/0x2890 [ 1102.193173] ? xsk_setsockopt+0x44d/0x5a0 [ 1102.197321] ? __sys_setsockopt+0x14d/0x240 [ 1102.201655] ? __x64_sys_setsockopt+0xba/0x150 [ 1102.206237] ? do_syscall_64+0xf9/0x620 [ 1102.210212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.215589] ? lock_acquire+0x170/0x3c0 [ 1102.219564] ? xsk_setsockopt+0x1bd/0x5a0 [ 1102.223714] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1102.228563] ? __mutex_lock+0x365/0x1200 [ 1102.232636] ? should_fail+0x142/0x7b0 [ 1102.236529] ? fs_reclaim_release+0xd0/0x110 [ 1102.240946] ? setup_fault_attr+0x200/0x200 [ 1102.245263] ? lock_acquire+0x170/0x3c0 [ 1102.245660] FAULT_INJECTION: forcing a failure. [ 1102.245660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1102.249242] ? check_preemption_disabled+0x41/0x280 [ 1102.266024] ? xskq_create+0x44/0x190 [ 1102.269820] alloc_pages_current+0x193/0x2a0 [ 1102.274226] __get_free_pages+0x8/0x40 [ 1102.278110] xskq_create+0xf4/0x190 [ 1102.281726] xsk_setsockopt+0x44d/0x5a0 [ 1102.285684] ? xsk_sendmsg+0xfa0/0xfa0 [ 1102.289557] ? aa_af_perm+0x230/0x230 [ 1102.293356] __sys_setsockopt+0x14d/0x240 [ 1102.297497] ? kernel_accept+0x310/0x310 [ 1102.301550] ? fput+0x2b/0x190 [ 1102.304735] ? ksys_write+0x1c8/0x2a0 [ 1102.308529] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1102.313880] __x64_sys_setsockopt+0xba/0x150 [ 1102.318281] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1102.322850] do_syscall_64+0xf9/0x620 [ 1102.326642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.331818] RIP: 0033:0x4665d9 [ 1102.334994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.353895] RSP: 002b:00007f441ce96188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1102.361594] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1102.368846] RDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000004 08:53:12 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180), 0xb5, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="ec03ffff", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={r2, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r2}, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000001a40)) r4 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r5, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:12 executing program 5 (fault-call:5 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:12 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x0, @sdr={0x0, 0x9}}) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x5) [ 1102.376099] RBP: 00007f441ce961d0 R08: 0000000000000004 R09: 0000000000000000 [ 1102.383360] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 1102.390610] R13: 00007ffe341c31bf R14: 00007f441ce96300 R15: 0000000000022000 [ 1102.397883] CPU: 0 PID: 2642 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1102.405684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.415718] Call Trace: [ 1102.415741] dump_stack+0x1fc/0x2ef [ 1102.415760] should_fail.cold+0xa/0xf [ 1102.415783] ? setup_fault_attr+0x200/0x200 [ 1102.415797] ? _copy_from_user+0xd2/0x130 [ 1102.415822] __alloc_pages_nodemask+0x239/0x2890 [ 1102.415840] ? check_preemption_disabled+0x41/0x280 [ 1102.415857] ? lock_downgrade+0x720/0x720 [ 1102.415877] ? __lock_acquire+0x6de/0x3ff0 [ 1102.415897] ? proc_fail_nth_write+0x95/0x1d0 [ 1102.415913] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1102.415930] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1102.415952] ? ksys_write+0x241/0x2a0 [ 1102.470090] ? lock_downgrade+0x720/0x720 [ 1102.474255] ? vfs_write+0x3d7/0x540 [ 1102.477986] cache_grow_begin+0xa4/0x8a0 [ 1102.482073] ? setup_fault_attr+0x200/0x200 [ 1102.486394] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 1102.491158] cache_alloc_refill+0x273/0x340 [ 1102.495500] kmem_cache_alloc+0x346/0x370 [ 1102.499669] getname_flags+0xce/0x590 [ 1102.503467] __x64_sys_execveat+0xce/0x120 [ 1102.507714] do_syscall_64+0xf9/0x620 [ 1102.511517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.516703] RIP: 0033:0x4665d9 [ 1102.519892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.538802] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1102.546525] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1102.553793] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1102.561052] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1102.568312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1102.575568] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 [ 1102.582840] CPU: 1 PID: 2638 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1102.590642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.600021] Call Trace: [ 1102.602620] dump_stack+0x1fc/0x2ef [ 1102.606259] should_fail.cold+0xa/0xf [ 1102.610075] ? setup_fault_attr+0x200/0x200 [ 1102.614407] ? lock_acquire+0x170/0x3c0 [ 1102.618395] __should_failslab+0x115/0x180 [ 1102.622651] should_failslab+0x5/0x10 [ 1102.626457] kmem_cache_alloc_trace+0x284/0x380 [ 1102.631132] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1102.636157] snd_seq_pool_new+0x40/0x240 [ 1102.640227] snd_seq_fifo_new+0x57/0x270 [ 1102.644298] snd_seq_open+0x46a/0x590 [ 1102.648105] ? snd_seq_release+0xe0/0xe0 [ 1102.652175] snd_open+0x212/0x440 [ 1102.655651] ? snd_register_device+0x420/0x420 [ 1102.660239] chrdev_open+0x266/0x770 [ 1102.663963] ? lockref_get+0x11/0x50 [ 1102.667681] ? __register_chrdev+0x400/0x400 [ 1102.672099] ? check_preemption_disabled+0x41/0x280 [ 1102.677129] do_dentry_open+0x4aa/0x1160 [ 1102.681204] ? __register_chrdev+0x400/0x400 [ 1102.685622] ? inode_permission.part.0+0x10c/0x450 [ 1102.690568] ? chown_common+0x550/0x550 [ 1102.694551] ? inode_permission+0x3d/0x140 [ 1102.698972] path_openat+0x793/0x2df0 [ 1102.702786] ? path_lookupat+0x8d0/0x8d0 [ 1102.706861] ? mark_held_locks+0xf0/0xf0 [ 1102.710935] do_filp_open+0x18c/0x3f0 [ 1102.714740] ? may_open_dev+0xf0/0xf0 [ 1102.718548] ? lock_downgrade+0x720/0x720 [ 1102.722714] ? lock_acquire+0x170/0x3c0 [ 1102.726794] ? __alloc_fd+0x34/0x570 [ 1102.730518] ? do_raw_spin_unlock+0x171/0x230 [ 1102.735019] ? _raw_spin_unlock+0x29/0x40 [ 1102.739168] ? __alloc_fd+0x28d/0x570 [ 1102.742977] do_sys_open+0x3b3/0x520 [ 1102.746696] ? filp_open+0x70/0x70 [ 1102.750252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1102.755625] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1102.760666] ? do_syscall_64+0x21/0x620 [ 1102.764640] do_syscall_64+0xf9/0x620 [ 1102.768472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.773655] RIP: 0033:0x4665d9 [ 1102.776857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.795768] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1102.803493] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1102.810852] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1102.818296] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 08:53:13 executing program 3 (fault-call:5 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:13 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r1, &(0x7f0000000040)={0x7}, 0x7) dup3(r1, r0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900, 0x2}) 08:53:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x2, &(0x7f0000000180)=0x80, 0x4) 08:53:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x80, 0x4) 08:53:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x4, &(0x7f0000000180)=0x80, 0x4) [ 1102.825589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1102.832855] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 08:53:13 executing program 0 (fault-call:3 fault-nth:8): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) 08:53:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r0, 0x18) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:13 executing program 5 (fault-call:5 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x20000184) 08:53:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r1, 0x0, r2, 0x0, 0x8000, 0x0) mmap(&(0x7f000045a000/0x2000)=nil, 0x2000, 0x1000003, 0x50, r1, 0xd07db000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r5 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r5, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) splice(r3, &(0x7f0000000180), r5, &(0x7f00000001c0), 0x3, 0x4) [ 1103.106751] FAULT_INJECTION: forcing a failure. [ 1103.106751] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.107566] FAULT_INJECTION: forcing a failure. [ 1103.107566] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.137209] CPU: 1 PID: 2692 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1103.145033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.154390] Call Trace: [ 1103.156991] dump_stack+0x1fc/0x2ef [ 1103.160629] should_fail.cold+0xa/0xf [ 1103.164437] ? setup_fault_attr+0x200/0x200 [ 1103.168762] ? lock_acquire+0x170/0x3c0 [ 1103.172747] __should_failslab+0x115/0x180 [ 1103.176996] should_failslab+0x5/0x10 [ 1103.180802] kmem_cache_alloc+0x277/0x370 [ 1103.184955] dup_fd+0x85/0xbf0 [ 1103.188149] ? __do_execve_file+0x243/0x2360 [ 1103.192554] unshare_files+0x16c/0x260 [ 1103.196442] ? __ia32_sys_unshare+0x40/0x40 [ 1103.200759] ? rcu_nmi_exit+0xb3/0x180 [ 1103.204648] ? retint_kernel+0x2d/0x2d [ 1103.208545] __do_execve_file+0x28d/0x2360 [ 1103.212787] ? open_exec+0x70/0x70 [ 1103.216329] ? check_preemption_disabled+0x41/0x280 [ 1103.221341] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1103.226533] ? __phys_addr+0x9a/0x110 [ 1103.230344] ? __check_object_size+0x17b/0x3e0 [ 1103.234941] do_execveat+0x3d/0x50 [ 1103.238493] __x64_sys_execveat+0xe1/0x120 [ 1103.242730] do_syscall_64+0xf9/0x620 [ 1103.246536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.251721] RIP: 0033:0x4665d9 [ 1103.254911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.273811] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1103.281526] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1103.288794] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1103.296064] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1103.303449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1103.310718] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 [ 1103.321484] CPU: 0 PID: 2687 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1103.329290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.338641] Call Trace: [ 1103.341231] dump_stack+0x1fc/0x2ef [ 1103.344870] should_fail.cold+0xa/0xf [ 1103.348681] ? setup_fault_attr+0x200/0x200 [ 1103.353012] ? lock_acquire+0x170/0x3c0 08:53:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x2f, 0x0, 0x10, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2400, 0x10000000000004e7, 0x5, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1f}, 0x0, 0xfffffffffffbffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bcecb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7438c74f6c1174960953e17c9cd66b1b1571d394984eb773dade2aba274d24024d278dfe3e2260b4c8ecec6e1b5b173c2bd887bf16ff6ff3441f195e5f616a4163f1ea6fc11a73e0b3b91dbe243e65837f823c4e579337dc3d4eff6fbd5fd99abde308fde9254f5afe7fde50efe9a8fe40a2b727ee7cbf09cfae30d5a3056309cf67f6040fb051e2de2a02ce8706e"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) [ 1103.357007] __should_failslab+0x115/0x180 [ 1103.361245] should_failslab+0x5/0x10 [ 1103.365049] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1103.370168] __get_vm_area_node+0x128/0x3a0 [ 1103.374519] ? snd_seq_pool_init+0x88/0x310 [ 1103.378888] vmalloc+0xe6/0x1a0 [ 1103.382272] ? snd_seq_pool_init+0x88/0x310 [ 1103.386603] snd_seq_pool_init+0x88/0x310 [ 1103.390756] ? __init_waitqueue_head+0x31/0x90 [ 1103.395438] snd_seq_fifo_new+0x8f/0x270 [ 1103.399503] snd_seq_open+0x46a/0x590 [ 1103.403305] ? snd_seq_release+0xe0/0xe0 [ 1103.407384] snd_open+0x212/0x440 [ 1103.410847] ? snd_register_device+0x420/0x420 [ 1103.415454] chrdev_open+0x266/0x770 [ 1103.419174] ? lockref_get+0x11/0x50 [ 1103.422892] ? __register_chrdev+0x400/0x400 [ 1103.427302] ? check_preemption_disabled+0x41/0x280 [ 1103.432327] do_dentry_open+0x4aa/0x1160 [ 1103.436397] ? __register_chrdev+0x400/0x400 [ 1103.440813] ? inode_permission.part.0+0x10c/0x450 [ 1103.445752] ? chown_common+0x550/0x550 [ 1103.449737] ? inode_permission+0x3d/0x140 [ 1103.453980] path_openat+0x793/0x2df0 [ 1103.457793] ? path_lookupat+0x8d0/0x8d0 [ 1103.461858] ? mark_held_locks+0xf0/0xf0 [ 1103.465924] do_filp_open+0x18c/0x3f0 [ 1103.469735] ? may_open_dev+0xf0/0xf0 [ 1103.473562] ? lock_downgrade+0x720/0x720 [ 1103.477723] ? lock_acquire+0x170/0x3c0 [ 1103.481695] ? __alloc_fd+0x34/0x570 [ 1103.485412] ? do_raw_spin_unlock+0x171/0x230 [ 1103.489909] ? _raw_spin_unlock+0x29/0x40 [ 1103.494058] ? __alloc_fd+0x28d/0x570 [ 1103.497872] do_sys_open+0x3b3/0x520 [ 1103.501592] ? filp_open+0x70/0x70 [ 1103.505136] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1103.510500] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1103.515519] ? do_syscall_64+0x21/0x620 [ 1103.519508] do_syscall_64+0xf9/0x620 [ 1103.523316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.528501] RIP: 0033:0x4665d9 [ 1103.531690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.550587] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1103.558296] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1103.565568] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1103.572842] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1103.580114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1103.587398] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 [ 1103.612842] syz-executor.0: vmalloc: allocation failure: 9600 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1103.626961] syz-executor.0 cpuset=/ mems_allowed=0-1 08:53:14 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f0000000080)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)="66120bd0161a8865dbcec0d6b5e16739b29134bf91d8ac1a39e1bdb1170986a1909d35c5d471687fe2f9f810e390792c64bafd4e491651e579d785b2ba113c762d0cddea2be7d5291140b233ce79bc77377cb27a8b0c875da89069c6020bd5b3c9bf2194b8df01569f8180666ba2a2417be3dc871deb7fe4383ff052", 0x7c}, {&(0x7f00000001c0)="d96fe50d3714bb3442c4201a7111746f9e2519044aa8f14bc3259f776f52169a3a74efd0ca25698d0e131b8ba0b1b375dc320c2d51be7729aa", 0x39}, {&(0x7f0000000200)="e298cc0abf18b396d4e0aee268421f83d61ebb267a2e8bdec7231c8f5b5ded61732dc007b4fdd5e83efc94b4cbc5cc59f200964d211a1fd0b3d69c300e231ca49da862ee890d0d76c916c2e8d45fbc670af70cb857f3df01cdb48b7fc593b9d395030ec01a4ec7ca8e44768738c85ddf9dc508999723eab565a07336d4ced4fb73d7a51d7c779d9b56b8d089cb48cd6eedecb3064c0e02dcdf77c114cc9e2bf1e73fc056e907a9800263b977b624015f03fa3606aa9639302a1a0af9ebe8622196902c3b", 0xc4}, {&(0x7f0000000300)="309b037744c1f31191d9843f1d57ebe6177a00f34a82e9c43db07df70e3cc9bc03224dca971cd4ed466d3bb7b2afad00560183abce184384031e9b5fcc9d698fab97d8a88dad533bc99a9bb178c5a3a0cc", 0x51}, {&(0x7f0000000380)="7bb7e9a0b40e78e871b1728d6a0931df61ab1b71b4f4f45bf131eb4e97d5e887a6a7b1ed03df5bfd8458c7164f7d0ffd71d395e88623c8833be1ee9942e9be3963ffd85919f8e72b90f263f53cb796e90ad843a3e0e66fdb41614680e827541dfb338677fb8d0cf4fe620a8a432da74319244f0c4f3f808e7fc65733cb926029e8830ba28a65a08b2f6d5e19d2f3fa0026ef9a5e02a6c8a7f9097b3b6912da10d4b198e2b2770c80d79647ccfe049b8389dc", 0xb2}, {&(0x7f0000000440)="05260a58a0ff349f7ab2555dbe9878c44ceac1b54b63c9d04361d51c5bc39bf80b293a6f46b87b368e2ed4283fad3db44978106b7b6ecf940fe184016e99c3eb6fc13ea048804616c883588dc6ed438dfb92d58be7aab0d7e1592ff43fd70412c683e88697ca76d713fa7ca2874b92e0070b", 0x72}], 0x6, &(0x7f0000000540)=[@ip_retopts={{0x80, 0x0, 0x7, {[@cipso={0x86, 0x33, 0x0, [{0x2, 0x8, "b765f5680df5"}, {0x5, 0xf, "efd3435395856d2398a1a2a51f"}, {0x5, 0x12, "7d41bd60d4264467c6a4170da7778f3e"}, {0x2, 0x4, "c1ff"}]}, @rr={0x7, 0x7, 0xd4, [@dev={0xac, 0x14, 0x14, 0x37}]}, @end, @ra={0x94, 0x4}, @noop, @ssrr={0x89, 0x7, 0xd3, [@empty]}, @ssrr={0x89, 0x27, 0x32, [@broadcast, @multicast2, @dev={0xac, 0x14, 0x14, 0x32}, @private=0xa010100, @broadcast, @rand_addr=0x64010100, @loopback, @private=0xa010102, @loopback]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102}}}], 0xa0}, 0x4004000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1103.655290] CPU: 0 PID: 2687 Comm: syz-executor.0 Not tainted 4.19.196-syzkaller #0 [ 1103.663133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.672488] Call Trace: [ 1103.675110] dump_stack+0x1fc/0x2ef [ 1103.678753] warn_alloc.cold+0x7b/0x18f [ 1103.682732] ? zone_watermark_ok_safe+0x260/0x260 [ 1103.687590] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 1103.692875] ? __get_vm_area_node+0x2e2/0x3a0 [ 1103.697389] ? snd_seq_pool_init+0x88/0x310 [ 1103.701734] vmalloc+0x15c/0x1a0 08:53:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = perf_event_open(&(0x7f0000002380)={0x5, 0x80, 0xbf, 0xa, 0x0, 0x1, 0x0, 0x80c51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_config_ext={0xdf, 0x6}, 0x0, 0x0, 0x0, 0xa, 0x200, 0x6, 0x100, 0x0, 0xa, 0x0, 0xb6}, 0x0, 0x9, r1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:14 executing program 5 (fault-call:5 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1103.705107] snd_seq_pool_init+0x88/0x310 [ 1103.709257] ? __init_waitqueue_head+0x31/0x90 [ 1103.713852] snd_seq_fifo_new+0x8f/0x270 [ 1103.717920] snd_seq_open+0x46a/0x590 [ 1103.721732] ? snd_seq_release+0xe0/0xe0 [ 1103.725801] snd_open+0x212/0x440 [ 1103.729272] ? snd_register_device+0x420/0x420 [ 1103.733852] chrdev_open+0x266/0x770 [ 1103.737744] ? lockref_get+0x11/0x50 [ 1103.741458] ? __register_chrdev+0x400/0x400 [ 1103.745902] ? check_preemption_disabled+0x41/0x280 [ 1103.750928] do_dentry_open+0x4aa/0x1160 08:53:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec99af97765ce27b90300060000000000000082200005000000040203000000002000f400b3d7c52e8107e4a7c8c3b053cefd10c125f1ba085b13d8da3d1e6e9f2bfa1e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000004, 0x4012, r2, 0x0) [ 1103.755000] ? __register_chrdev+0x400/0x400 [ 1103.759417] ? inode_permission.part.0+0x10c/0x450 [ 1103.764350] ? chown_common+0x550/0x550 [ 1103.768332] ? inode_permission+0x3d/0x140 [ 1103.772576] path_openat+0x793/0x2df0 [ 1103.776391] ? path_lookupat+0x8d0/0x8d0 [ 1103.780482] ? mark_held_locks+0xf0/0xf0 [ 1103.784548] do_filp_open+0x18c/0x3f0 [ 1103.788351] ? may_open_dev+0xf0/0xf0 [ 1103.792171] ? lock_downgrade+0x720/0x720 [ 1103.796319] ? lock_acquire+0x170/0x3c0 [ 1103.800294] ? __alloc_fd+0x34/0x570 [ 1103.804012] ? do_raw_spin_unlock+0x171/0x230 [ 1103.808514] ? _raw_spin_unlock+0x29/0x40 [ 1103.812668] ? __alloc_fd+0x28d/0x570 [ 1103.816474] do_sys_open+0x3b3/0x520 [ 1103.820197] ? filp_open+0x70/0x70 [ 1103.823762] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1103.829130] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1103.834150] ? do_syscall_64+0x21/0x620 [ 1103.838127] do_syscall_64+0xf9/0x620 [ 1103.842040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.847243] RIP: 0033:0x4665d9 [ 1103.850439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.869349] RSP: 002b:00007fa2d78a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1103.877067] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1103.884341] RDX: 0000000000004800 RSI: 0000000020000800 RDI: ffffffffffffff9c [ 1103.891614] RBP: 00007fa2d78a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1103.898882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1103.906149] R13: 00007ffe9a79130f R14: 00007fa2d78a5300 R15: 0000000000022000 [ 1103.933521] FAULT_INJECTION: forcing a failure. [ 1103.933521] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.999264] CPU: 1 PID: 2717 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1104.007092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.016450] Call Trace: [ 1104.019046] dump_stack+0x1fc/0x2ef [ 1104.022681] should_fail.cold+0xa/0xf [ 1104.026492] ? setup_fault_attr+0x200/0x200 [ 1104.030824] ? lock_acquire+0x170/0x3c0 [ 1104.034840] __should_failslab+0x115/0x180 [ 1104.039084] should_failslab+0x5/0x10 [ 1104.042898] kmem_cache_alloc_trace+0x284/0x380 [ 1104.047581] alloc_fdtable+0x7e/0x280 [ 1104.051392] dup_fd+0x6a2/0xbf0 [ 1104.054690] unshare_files+0x16c/0x260 [ 1104.058591] ? __ia32_sys_unshare+0x40/0x40 [ 1104.062919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1104.066829] Mem-Info: [ 1104.067675] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1104.070191] active_anon:182133 inactive_anon:24672 isolated_anon:0 [ 1104.070191] active_file:6938 inactive_file:94890 isolated_file:0 [ 1104.070191] unevictable:3593 dirty:264 writeback:0 unstable:0 [ 1104.070191] slab_reclaimable:15862 slab_unreclaimable:130998 [ 1104.070191] mapped:66469 shmem:33610 pagetables:5047 bounce:0 [ 1104.070191] free:1161259 free_pcp:639 free_cma:0 [ 1104.074636] __do_execve_file+0x28d/0x2360 [ 1104.074649] ? rcu_nmi_exit+0xb3/0x180 [ 1104.074681] ? open_exec+0x70/0x70 [ 1104.109749] Node 0 active_anon:728532kB inactive_anon:98688kB active_file:27636kB inactive_file:379560kB unevictable:14372kB isolated(anon):0kB isolated(file):0kB mapped:265876kB dirty:1056kB writeback:0kB shmem:134440kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 503808kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1104.113322] ? audit_kill_trees+0x230/0x230 [ 1104.113342] do_execveat+0x3d/0x50 [ 1104.117496] Node 1 active_anon:0kB inactive_anon:0kB active_file:116kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1104.120757] __x64_sys_execveat+0xe1/0x120 [ 1104.120775] do_syscall_64+0xf9/0x620 [ 1104.120797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1104.150308] Node 0 DMA free:15908kB min:204kB low:252kB high:300kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1104.154129] RIP: 0033:0x4665d9 [ 1104.154144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.154150] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1104.157960] lowmem_reserve[]: 0 2693 2695 2695 2695 [ 1104.183414] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1104.183422] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1104.183430] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1104.183437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1104.183445] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 [ 1104.319292] Node 0 DMA32 free:588276kB min:35996kB low:44992kB high:53988kB active_anon:728332kB inactive_anon:98688kB active_file:27636kB inactive_file:379560kB unevictable:14372kB writepending:1056kB present:3129332kB managed:2763460kB mlocked:14368kB kernel_stack:13600kB pagetables:20188kB bounce:0kB free_pcp:2564kB local_pcp:1212kB free_cma:0kB [ 1104.352498] lowmem_reserve[]: 0 0 1 1 1 [ 1104.361844] Node 0 Normal free:8kB min:24kB low:28kB high:32kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:2000kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1104.393674] lowmem_reserve[]: 0 0 0 0 0 [ 1104.401265] Node 1 Normal free:4040312kB min:53876kB low:67344kB high:80812kB active_anon:0kB inactive_anon:0kB active_file:116kB inactive_file:0kB unevictable:0kB writepending:0kB present:4194304kB managed:4128248kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1104.432991] lowmem_reserve[]: 0 0 0 0 0 [ 1104.438021] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1104.455382] Node 0 DMA32: 1688*4kB (UME) 739*8kB (UME) 86*16kB (UME) 519*32kB (UME) 534*64kB (UME) 179*128kB (UME) 56*256kB (UE) 17*512kB (UME) 3*1024kB (UE) 4*2048kB (ME) 115*4096kB (UM) = 593080kB [ 1104.476870] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 1104.493329] Node 1 Normal: 124*4kB (UME) 421*8kB (UE) 298*16kB (UME) 80*32kB (UME) 19*64kB (UME) 14*128kB (UME) 9*256kB (UME) 7*512kB (UME) 4*1024kB (UM) 1*2048kB (U) 980*4096kB (M) = 4040312kB [ 1104.514616] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1104.524330] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1104.536757] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1104.547021] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1104.558431] 79480 total pagecache pages [ 1104.562418] 0 pages in swap cache 08:53:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4800) 08:53:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x4, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x1, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) splice(r3, 0x0, r4, 0x0, 0x8000, 0x0) r5 = syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000200)='./file0\x00', 0x4, 0x7, &(0x7f0000001740)=[{&(0x7f0000000300)="d4507cc3579b47346eca38485d6e093768d76a06fe1c4856658ee382b9e6f8a5dfd6a7c3e81ca3d1a581a38975dee38795747f66817cc0634ed5dd422cc5a1c6f1fecb373c44a23b2005abdb1b6ae5c4446ac4ba929f59236154ce54225aa6c7c836352ea459626804c60a42d060647901eb46c419fed25818b45dde92df7f8926d466d7e1c8c269fbda4cdf49b0e6300828cd7e92d9b0f4d33abb9dd2282d8e9425a8e5c06f3a55bc02ef18f9de6b26571affb2c656917c114f6ec5f8552c31a951fc1e078640f75d2aef38e61f4206d7bc3dfde86b9a3f6b2a6379af7eb7aeb0ec985ef5ac1c70fa87495fef88c0fc1c9a4c", 0xf3, 0x7}, {&(0x7f0000000400)="16fad7d04ca38d636632ae69818663c64faa50e2ae9c569720e57d13345303e2149fc8d98b85e4c5fee055b751c2950f690dbae5b3942a003900c58a22cf8fab891312c72af43f892d", 0x49, 0x5}, {&(0x7f0000000480)="f0e0387f987fe8c3d8e1dc141ba39726e364e8545c2e0aa15d7351a742e056f2747be5b8bf2d6b4bc91c4d1112734ca34a55c6f1cee07a4c85d75de6ed2937805d9fafffd2b33ea15a1e2014a99cbbafb7decd2b95963a2843fb44e81eb060e80e0667c7e8764fed98cc260764e80b61acd0bace84925e49daaa836f63c175ef8b9e4f77b3e68efd794892c586ce719a1395be2713f4e5142aaaec4bda5bbe8915e5", 0xa2, 0x8000}, {&(0x7f0000000540)="d2b49bcc8baafb52f47ff6f1b0def949322a8029fa98d23bc0f827e8a33f99273e755a49484501fadc7f796a1afd0f8e6e86645ed4bc0049bf002827d00dd7f2558e3098063c7b6620a0a39f7580808524318a12012c8675bca3f3b1c70517a2ec89483a6c26790432736ccf6486307c24498a6ecf6e40d2f18bc50575a75b9099fea76f3a752d61de5d9e03130eb239f1e3b7f5f02dbf33a9786355f9b307531e4a3cfe15c28a6450c5c4b109d89663c34fcaa2668bd249b2f0da00fee2d69b9e0b80042e3d31610e8fb0ad841c3d26887069ae15a37c311f48867ea50ef4a956c77b75d2cd1e7dcf", 0xe9, 0x3}, {&(0x7f0000000240)="552f82a9bd7a5c46a5571c1db292bd83", 0x10, 0x101}, {&(0x7f0000000640)="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", 0x1000, 0xa1}, {&(0x7f0000001640)="32cc6dbcab70d0628fdbf9b97143ef64913b264afcb606e5c8dd6962192aba2cd64085f40ebf171e01af4fe176b1b95ccee3cbac99ff942667a722521839bca3be11cc3e35e503e9aff0b083628cc27fd1b6829bb7222a2ade2981f265d752c606b65dfcdbe7d978a2049307938fa89a487faa69621c58d541224c87033f6c9ac3b85f0d7ce680b5935fa098afad0ac61e27dcc6a6029ad1bc2a42f18dbee3a987bcb6ca2395917a1a79a3344dcbdba87fa23ff252ba8e30e3b3ae6ba892d5b3021e8c3e3c8481b43058", 0xca, 0x8001}], 0x1b2002, &(0x7f0000001800)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@obj_role={'obj_role', 0x3d, '$}'}}, {@smackfshat={'smackfshat', 0x3d, '\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@pcr={'pcr', 0x3d, 0x24}}, {@fsname={'fsname', 0x3d, '\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, '%[-@\\*]]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '{\'$'}}, {@fsname={'fsname', 0x3d, '\']\\!\'!^-'}}]}) fanotify_mark(r4, 0x20, 0x1, r5, &(0x7f0000001980)='./file0\x00') openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000161000/0x3000)=nil, 0x3000, 0x100000b, 0x2010, r0, 0xa6e66000) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000140)=""/21, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @private, @local}, &(0x7f0000000080)=0xc) 08:53:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f3b4c466000002e090000f700000000000300060000000000050000000402030000000020000700b3d7c52ebf21a8d5c8c3b053cefd10c125f1be085b13c84e7c4bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d731272bc229cc201d1ed44dfcfcbaa7d693dbe0ec063346f9d0d2d4ce0e000b8099c42fa02780a3f5a2afc549488a0d1c739a0e6ad5ae4762a9de13c803568053c5683644bb41a5d653bb75233d0270171b6cfd0ee14f588059aeba437f581750"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:15 executing program 5 (fault-call:5 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1104.567642] Swap cache stats: add 0, delete 0, find 0/0 [ 1104.573036] Free swap = 0kB [ 1104.579139] Total swap = 0kB [ 1104.582169] 2097051 pages RAM [ 1104.587051] 0 pages HighMem/MovableOnly [ 1104.591030] 369647 pages reserved [ 1104.594600] 0 pages cma reserved [ 1104.696512] FAULT_INJECTION: forcing a failure. [ 1104.696512] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.735341] CPU: 1 PID: 2735 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1104.743165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.752528] Call Trace: [ 1104.755137] dump_stack+0x1fc/0x2ef [ 1104.758801] should_fail.cold+0xa/0xf [ 1104.762617] ? setup_fault_attr+0x200/0x200 [ 1104.766954] __should_failslab+0x115/0x180 [ 1104.771200] should_failslab+0x5/0x10 [ 1104.775013] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1104.780135] __kmalloc_node+0x38/0x70 [ 1104.783944] kvmalloc_node+0x61/0xf0 [ 1104.787665] alloc_fdtable+0xcd/0x280 [ 1104.791473] dup_fd+0x6a2/0xbf0 [ 1104.794765] unshare_files+0x16c/0x260 [ 1104.798654] ? __ia32_sys_unshare+0x40/0x40 [ 1104.802972] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1104.807730] __do_execve_file+0x28d/0x2360 [ 1104.811973] ? open_exec+0x70/0x70 [ 1104.815516] ? __check_object_size+0x1c/0x3e0 [ 1104.820018] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1104.825203] ? __phys_addr+0x9a/0x110 [ 1104.829005] ? __check_object_size+0x17b/0x3e0 [ 1104.833589] do_execveat+0x3d/0x50 [ 1104.837136] __x64_sys_execveat+0xe1/0x120 [ 1104.841386] do_syscall_64+0xf9/0x620 [ 1104.845194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1104.850397] RIP: 0033:0x4665d9 [ 1104.853589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.872486] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1104.880191] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1104.887492] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 08:53:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x4a) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x85, 0x4) [ 1104.894763] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1104.902029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1104.909297] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 08:53:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffffc8, &(0x7f0000000800), 0x4800) 08:53:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x10d100, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) r3 = perf_event_open(&(0x7f0000002380)={0x0, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0xe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x2, @perf_bp={&(0x7f0000000140), 0xa}, 0x914, 0x2, 0x0, 0x8, 0x200, 0x80000009, 0x400, 0x0, 0xa}, 0x0, 0x9, r2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240), 0x10140, 0x0) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000380)={0x9b0000, 0x2, 0xabb, r5, 0x0, &(0x7f0000000340)={0x8b432d1acf44aeb2, 0x7fffffff, '\x00', @ptr=0x4287}}) openat(r0, &(0x7f0000000040)='./file0\x00', 0x6c1, 0x14) 08:53:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4802) 08:53:15 executing program 5 (fault-call:5 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d700"/104], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) splice(r3, 0x0, r4, 0x0, 0x8000, 0x0) mmap(&(0x7f000028b000/0x2000)=nil, 0x2000, 0x3000004, 0x1010, r4, 0x57f27000) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x30, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f00000001c0)=""/204, 0x1001000, 0x800, 0x1ff, 0x3}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4803) [ 1105.233105] FAULT_INJECTION: forcing a failure. [ 1105.233105] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.257108] CPU: 0 PID: 2762 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1105.264939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.274385] Call Trace: [ 1105.276987] dump_stack+0x1fc/0x2ef 08:53:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={r2, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x4}, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r4, 0x8040942d, &(0x7f0000000180)) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000008, 0x10, r4, 0x69d69000) r5 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r6 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r6, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1105.280630] should_fail.cold+0xa/0xf [ 1105.284448] ? setup_fault_attr+0x200/0x200 [ 1105.288787] __should_failslab+0x115/0x180 [ 1105.293030] should_failslab+0x5/0x10 [ 1105.296841] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1105.301960] __kmalloc_node+0x38/0x70 [ 1105.305772] kvmalloc_node+0x61/0xf0 [ 1105.309498] alloc_fdtable+0x139/0x280 [ 1105.313395] dup_fd+0x6a2/0xbf0 [ 1105.316694] unshare_files+0x16c/0x260 [ 1105.320597] ? __ia32_sys_unshare+0x40/0x40 [ 1105.324923] ? trace_hardirqs_on_thunk+0x1a/0x1c 08:53:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x4010, r0, 0xaf6da000) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) bind(r1, &(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x3, {{0x40}, 0x3}}, 0x80) openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@deltaction={0xc8, 0x31, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xaa5}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80000001}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}, @TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xffff652f}}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4040010}, 0x40005) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000380)={r2}) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1105.329774] __do_execve_file+0x28d/0x2360 [ 1105.334026] ? rcu_nmi_exit+0xb3/0x180 [ 1105.337924] ? open_exec+0x70/0x70 [ 1105.341481] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1105.346246] ? rcu_nmi_exit+0xb3/0x180 [ 1105.350141] ? retint_kernel+0x2d/0x2d [ 1105.354128] do_execveat+0x3d/0x50 [ 1105.357681] __x64_sys_execveat+0xe1/0x120 [ 1105.361917] do_syscall_64+0xf9/0x620 [ 1105.365728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.370917] RIP: 0033:0x4665d9 [ 1105.374108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.393006] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1105.400717] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1105.407986] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1105.415265] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1105.422538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1105.429813] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 08:53:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4804) 08:53:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x142, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'bridge0\x00'}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4805) 08:53:16 executing program 5 (fault-call:5 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) accept4(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x80, 0x80800) fsetxattr$security_ima(r0, &(0x7f0000000100), &(0x7f00000001c0)=@ng={0x4, 0x1, "4dfabc3eb6795a215942"}, 0xc, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) socket(0x2b, 0x1, 0x3d) mount(&(0x7f0000005580)=@loop={'/dev/loop', 0x0}, &(0x7f00000055c0)='./file0\x00', &(0x7f0000005600)='fusectl\x00', 0x1244000, &(0x7f0000005640)='security.ima\x00') sendmmsg(r0, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000200)="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", 0x1000}], 0x1, &(0x7f0000001240)=[{0x60, 0x100, 0x1, "61c8689c9fac2711c8bb01dd5de4e9b0c3608409f21c6cf9b35154aaa909c2d777a2b3cd2b4e2beecaf997380883be8cb9f0c27a27b55c9527be7af536bcadaf16925272c3daaf120110"}, {0xc0, 0x112, 0x6, "6896709ba9807400ae195c5f6f41a81c20b66c08613571b87643d9a5b94dd850824c544242d9380432c2a9fc145fb168d0fba49703da9273b20ebe8bc6e62dbda57f73b4ff0574014c2dae0477f50fa2aeb09f173e78b658cd57b9361e52a850e2085f9ee8c43a0eb62d2352a299dbf77decbd18c066fe428261d4bec3344dced6afa14a1cda269ca389786679f1a43052e0ba67aa0f97815e1cc4bdd4f46f490fa5dc4c8eca3d6c70876a3618e45d39"}], 0x120}}, {{&(0x7f0000001380)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001400)="a4fc2d3cb4447714778cdf475c84df57f4600a4cefe3a437c752575cc119f97c956a61d9512f535ebd37775892d74006b272197c1e0933090442e76a51568b2571475e7c21df2a77fc09d73dd6f90a5ec96b0603355216f1f7f0f4b95c79d41088281b277a6dcb5a22f185e003cdc0001064581fda82b361e5412c3a1bb27119ac3d360ec1f724065d0a2c024cec93b638ac56d486abf6383bb10e3a8afe4254740dda4148fb9774817e8c1985efa863a661a71aa432962945c4e23e80f31b46624df28d45eb76725c54eb3d70120cf2b43c18529fdccb803a0fc9", 0xdb}, {&(0x7f0000001500)="5f6afb607a11f49a9a0b241ab9aea15b4d1e7948a19bfefd34cdc5d19c251ddbe1414a3b", 0x24}, {&(0x7f0000001540)="8e2af3701a7369e4d597a5c86660516bc4638e885b9c77c3a8d8bfb0f05d70e3f8cc73b09525b02875db6c41584f351bed227b61d35cf0757e70a4ccff15e74826f27e6acdab840afd7e9cee2c483cd905c8da3a5c8ee12ff26504111ac0b1ad3e15ed689aa3c1e5aba5c3da82c0542ffe2b581313b30008b82a5528cedf4d55962f637877949ffdf562841bbcb24fcc992366746194dc6be25c2f60b9205783a00755a87d5a2b5a416b4ab6a97e92b78cd53c2dcf56dd9cd144eba57f9aac4d67dc923ea4764b0f7b98b34a3de0654053a9", 0xd2}, {&(0x7f0000001640)="82a9e2ef85c1f1b9b01a9ecc8bd0f8301f6b3bf3c377a87316d2df4b54d02a77c20a91aabbeb073d82af522c20866f5fad93a30999f902b0392e2a3463e9b7a56742", 0x42}, {&(0x7f00000016c0)="e2c1a28dfcf4f43cc9077900cdcaa3624069c088dece00bc8947a5056fc0ce5128fa0c96bca5a257589346309615ab1666638e4c812ef4d93c338f37dbe834d823991b69fd80511a3f661aa3ea650f495a651c67af945175dc40c0f664dbde283a2d3c5b1283835ce98f8a6b46d749bfdcc8414afd5789", 0x77}, {&(0x7f0000001740)="5fe2e5f6891bd3cb7939d42ef7111f6f4c9f6ad67541269b66bd56a99991ff469c36b6a52f51f373d2d1f9ff82e6f72db3b05aaa5cd25450fe9f742e01c8c1d46bdf91fd819544f0814ba15d645a070c6545ce9676a6be6d488e37c59504c682066aaa6a7e48388482b45fce76bfd64eb69048fa3a0d614dae5827e1e855654b529e2e87bf50fb47f53e7f19a1a7bf3da2e3d7544c852b1edaf42cd9c07577d9d00742f129", 0xa5}, {&(0x7f0000001800)="e4d17c79690be1a30054a6cb0dedcb709ba894b9da701d2a306c4e71f6ed60a24e371f0f59e84a56a7f91bb180d9a189f96cd5c1e3dfa29b029167933ecefa4bc28c4aa861c4267265711fdab64a69937c7277ffa6ffbdbdec7be0c547ed8bdbdd29922449070a0150e3ede27425090014b613daf7d14b7cfe2dce5d3c7a52415b186a95bf86fa9ae95d1c614af22b75342601f72bdbfa0be1b3b813d5b2fa222f", 0xa1}], 0x7}}, {{&(0x7f0000001940)=@l2tp={0x2, 0x0, @local, 0x3}, 0x80, &(0x7f0000002e00)=[{&(0x7f00000019c0)="cbce68a042b0b1f3a506778e9f11d7cdebac43dc32c5ebd5c8fee103156ceca3b2eda5a5942d1a3e26b3e1e75aa58ebe7b940ac19daeaa1f729b38275a7ed2c2a3e002c04cc5c7da0e77e5cff593f864906da7f93b4235b5a1b6d2b7b7b0c8cd393558660ae55187f9f408f34bfac1d961df7cd8c40f580bf0ef11dc7d625373", 0x80}, {&(0x7f0000001a40)="bde939af28629b4316f661cafeade61b9bd05c0af67f38bbd3a15b4a64ea0bcb77d531ed2cdf45762938181a57ff9304ed82918cdbae511a285f5887fd863b99382ccc21bb97bf246a113664f437386520e893dda696df6fa80badbc0b9bc7ba904e38fb8a841f68d146a98553156b8577288a01d2b17a3c6d2ca27eab92099f1c4e0165a233d02a3a77ff0f4ca03b1b070b1826f219406d34e449ab69cc31497a92d7f43cc93cd0b3fc15efd29be0a155003f89ed9276b1805c89a6568050ffe9539b2f4064631d84c8b8e32dcaaf45478fe23c6e987bbf7406ba28fd2b127412a4a5c07ded25388717862687a388", 0xef}, {&(0x7f0000001b40)="04205fe946a3611a2de3173fac321b064ccea90738e54f5b9603fa327f41d2953d86345481763843cf213f7587b723dec1851854201d8c4f1ac456468e0c1f1da03fdaf74fe11ebef2f28a7429c4703cf4877a3c50a051486fb17047dce29354dd4cfa5d21b9913fd31a4496d23bf7877cd2aca1e1a2fbf2b30e81310d2c2baf28ef45f4189cda4946508411d2570057edd2ef5e8d58660051ec85b5935a830931768bac34e5e04d51f7e1981c3949", 0xaf}, {&(0x7f0000001c00)="a0455a9b869f79093263661aa697f421e7683f70f6b4f441cacda6c2550e13143ce7b5a6fd7567e70a96b9b90ac5dafb35f06506ee9c0439aefc325088f840d5e175100a5f86de8713aa6feea6d78f7b897ccf294e", 0x55}, {&(0x7f0000001c80)="d975492e8016c9424612ca2dfe06a8eb5fab496ed0c9b16b41443f5f40ce2e59a6da35408d985d1794", 0x29}, {&(0x7f0000001cc0)="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", 0x1000}, {&(0x7f0000002cc0)="4b289efaea0201f3fdd3c55ff42acae5da94bea10a2ff29eb1f12faed79d46859a5046b57d6336fa4fe115085e99736473e7d0f7e045f915cf3fcca465bd06f39e81d2c1de3d7c30cda7199cf8a64479169e4c1eb893fd71cac8e2d0551f06d40fa9dc750e7e0a77efb25241a001e6800c4da05526b7e2ace0c36e72a18956feec7c3ceb78291ca33404cadc4ba942611e36d84bd502fdce181073b74ba37b543599fd27", 0xa4}, {&(0x7f0000002d80)="383224064d890117dc9a86c9b659a201c7947d1579cc8c900efc5000b30fef72445922a704ed4527c3f22cf048312da1b1f75ec71d87013cf013ee2107d64ddd82418dc17437c5b3eb83d203e6b30ead020645a64e0c1dc518ebb76b22aad305", 0x60}], 0x8, &(0x7f0000002e80)=[{0x20, 0x104, 0x3ff, "8dbd20ddc951eda761"}, {0x70, 0x10e, 0x4, "614bcccfca5ac5c13ef1aae9191a65f976ba8e8322d73d2715dd58b47369627c7240c4e6095920d6a2f0f9e175ac40affbda4d1f0ea95d76ba3396aeea1a05c2d7afd6896b6f844c3ac325d69ad2ebc5cd06800ab32a49409c08637b54"}, {0xb8, 0x88, 0x40, "4a5a19975cd21b07c87bc2cf5fc951a6a009f18caed283fc5884dff5e1c307b8e8ce14f111c9657590661873ab1cfb6b06fd8bc5198377874427072af1d834b1077cd2bab9a7ed022e6123114dce1b7a1007e9701a9056a183084260320fcc93ec8275f7858228a5226adf43d674c1361611218a479f81e343a57ddbbdc432a3042b73919dace704583b6a3f1b4ad578f56175e7844848483512245be93865d159fe6a643244872d"}], 0x148}}, {{&(0x7f0000003000)=@ipx={0x4, 0x6, 0x7fff, "a5d3b42d977c", 0x20}, 0x80, &(0x7f0000005100)=[{&(0x7f0000003080)="f928f1aea548759ddafbe368a914755bce78e9f483f2355c3dc6a189ccf6f2868774d0f10ad492f041890c9421cddbd5651a7d189e311094e8a9756ae1786a39e48a16b549c72d6a289896c72a7934a4c121074876689dc5599deefe789b", 0x5e}, {&(0x7f0000003100)="a4e6caf16ce32df74c1f68007cb7b73168fef3b86a9cc02db56d72fa46e5fae6b05d29de54709c80a5ef5eeeacb7df790a66726c04f4c5e509e73e32a1c959ceacbdb468a9caba3b4ed52fb7a72ef3ab6bf71f70fa8bed6fb42352dc1c965c10320deaba153256131be5d5f7ce8f09468192030e77c6c0278e16997ca60f65bd14604bfc2687d9304b48e774d249a235d7c7d18a00a76d077c3e5211ad6637b2f1794582343735ba5f771e8550cb3f1953af812166570029e489a08986ddc64975d9760de2618149021867e62d41be5551cf95b248c63cd95ba4728d98876a5987f1ba3fb30e69495c12d8e653b82e20eee4368cecb7274b9d44d677265482c3cfca65bf309b347344b7f3c0504a3d5719146b162b300903911f0a2ece8238c1e49248345572ff3c82c7a61090c6b30aa85ba485879ecbb61701c179f67432a1496a2fc312a4fdb672b7b9c22ff94e38c48d80bc209199cf2c609f952d38950b1f17141bdb00897835cda6c96461be633b23e61e6b1dae28cdd58dc3f9fdf02c57ce601e8887cdaa97a8a7f01d2a18a71d4670188f130a4f27d0ca0f19f4b38278ae3c92c116b98f92c4ddd3f5f10bb58eaf3e78253862a94cfd230589a907aa596ff957995cb8751068d1e9d1bcefeaa55f12dcdf3c5fecae355dee142b53d33b59fd39399c34cd29660c32773d5b1e861f6e8652c49adafe57e3f191b2b257119c8a7f028992232e06eeebec8222faadc34d57f48dd9fa14cd84eab3d6d2b2270a1e3fa91b7293102640d80aa4e8523efd307944e95ba9b1eca81e7bc9aa3d215ea56cb3f1c7634dde2c3bae9a3554a991e09761d7fe9ba5702f5428fca7f31f8f7eeca04d88e5ee94611b4ce469fd0a12cf7eb79c2d3ee6a7c8edaf5f476fc164023a8f089d54182cc3397ad976fb93ca3a65124e6dd791d5db49ba76f9c464d2af19e34a4e58255788723e0ca01f79981f361dae866db3e4a0fa6951013dc3786953ab7c4b7d8f22f4f29592f0883d5c7e701e5983468caae478f8377a044bf15b3963b86cab3496a92f38b7612b9b0ce4fde0a7a4b00c7b78ba98afef4c98cca2a2bd887ff9521cdc33bdd1cb060693bef0d603b276accf8f75c9b3cb98d423d12fb976d7db137cb4b12c712b2481bdbd6706e5f4cd3782b3d95f74fd6f44f93ce488ad33b7bb8ad2fcd7aaea992157eb9124da3c65a82455528f305d051e0e511132954b42539931809f6654c0078aa5a91daa511a04f9c3309e85a64e90524724f1b7d8b0068cb858b3626af0ca65ea89d95abeb456d9a5b9aead7bbf65c28d4d0a1005e08e4b980a4209aebd51e48ecfab7c1a7ab9c4ecb6abd418bf368db3fb37a626bb3b59ae045b28b53c61a996d47059a419531ce5eeef85bf47579d7a07f7ec041aef349a02a210df974abb0aeb4d6d08937bffa5c324eb39dad9d79fa51499373774ea4f6daca4647dfbd745c8da1f32cbf6762266ddc47c2476ffeb574d8e79c3df7db86131b99e70f8e6ffb06b19628610706bc9dd8045677d7ef6f7043ab31e3444b52b17bb93848fb2808fa82288310f9e7c64ae8901fc36abd6ee1bb6fd6b6b960f42d4b22a0bc96c65469f0b906010d784e45672187bcb25c94ec48f3d624045d2cdd486d7e54bc0cc8b0e4c608a9caeaa33225ea08b4e70d29d7aa1be0c9382145354e40124514659ee2508acaa50bea0c107e9fccd4cd0d12e1d3462080f1ae0399a14d122d1060c6b9765e50d6303475e64a39777a163e425dc0eaebc45165660c76680521292038d5565c395f0cb7d55789bd54469f9d5ed359cc62deb0472e4d0c40ab373f80dbd549b06ea1b15e4b9beade228f6642af044269dc1eeeb68b7f9cd4db980f47009b1d0d5056ec4f6b198abbde96153206269d8c4971cbaa0a3803eabe074627cd69fa8ebc09aacff4dda07072c5132553d18271cdb4eecd239367990088ff49cadf1ce2daa3afa0bd8f5a04bff2e9a9c1ebc76e7a3dcc488b05682969938888cd034b95d75e4f41e3142d2f61bdf88a4543941041b146eab81dd0cf7c2e23a02f677b6066730e8d5a484b2e92032a3588c84704aff44823e3f275baa0358f279eed96f4e6702d34a7fbe41636274182afd226f15eb991c5bfbc1ce9361dd8becbe809bc20496ebd0040d4326e6149fdf0d9e5a4551e188d5c05e27592729f8c9816a4f167ff2d7ba1db8e883414026f344647a574243ca1a40e174ea43d28c399b4ae940f0ded3d9583cb815a457fbfc68f5b5eac53a09c698c2784307a56c3e6dcf726c4096c17dc58eba1985b71307906fd6df60aae919abf23e84030396fa2f5d4af313517052affeb29d06077a4be93b6a910c28f35b3d91931043e62e4b08371ffcf814488d66319be913182e80900ae8d791b99a1f35ecd55786ce5f184d77c27213ba91d3590bdf082d6eb9281dac752271fe3f2ba956afbdb38c98e9f79814d15ad6c96694b13fd7752922413e7e16d18eacd4a01f069526af2241a4394a82f9b19a434f7d596159e2d2af28675f3fa75586ab3f24e90f67772d6e8e04154a0596108149dda95af4a6f7fb27e6b5cc582699d31055318a0a55474d918baa4988bb468b287ee478eb8ba7b6b216a9f8a686073434a1bebd0a27365a8951cdb84bdb90b85e3e3497bcad017b597409959f574408a64e89996d8c7ec5d05b2c76c0fb758fa2d859d4667a682d873f56fb0ce1feba274b7d4b6b1efb7784fdba117000d11ea5f4e94f7d72960690b5e0fcb618b3b5eb0ea4dd7b5d7694051f39f6a8713eb9e7f93df401a8b8239c3075939ec0008dca09d29be798210b6619ebd9205d6c0a18204aa1aeeb4d29b7a66e80b8ae1f5f79bc1648d90ffeb5f275f7db8bb682cb06e2f1fdb10537c796de7a4e9e0e2045c52d8a50243c1dd4a5a01e66a7d73e5c4fc3d6d32f9a1b85fb13755f4a4a184ec17138535e4d9871ea005604335bf9e452ce9695ec7f6e724ab4fabf3521d7a186e94c77dac917947533b26cfd3d71d73941e5e4a41fc7156728ac130a2c646578bc658dbee5a5cafcc4c32015912fff255e360cdaaeb3720a34d683b904c68fcf834d44183807a2c9d22897ebeab5d812640492f0c21af7df79b2a5d6aa0997b7676d2d5622ded57460274c3c4cda307a7ac8be6232717d2574f51956525b5865d938c1f8043fb353f97b68a7ef31523dc9bb70a1ef126df5a2847de64850c747aab35ae494199832eec56b78ccf6adc5ab57005cf13e7e46fd5dcf6c4550a101f3b848837f6450140da1ec62599ff39ed00c927e92f545f1521640d7a5176906a6729386bc32047d942846ba20137fe373b010c8876fd9af68172792e0309a035964bd440fc012ab9436f470cf65261fdf4ba55aac7840fbd57259c284e8b1fc23514c5cd18e551a7c72b1a91aadae4221165a34b6e1cdb1b2901c47ae653f5557e8406122fb45fdb47e5e3eff8fee0db3fc39d0bfefbab873cbcf1df31fe97ad1220fba261ca348ad32fe80666267d6ebff29da589e38497ef6c6a48055807e0313364be1f741d951ebb615cbe1fd31bfae9e3c6032c7f2a9f5884aa5aa599eba14268f9c67976aafb3f47db766f5bc31f930cd7b9baa4e12ea7c832b82e1bb6a88d35ed286439d80f30641abff389b3ee8baf13ca200818aa13fad62e66afc716bf32a9f9d5c5fdd2c369d43af308a5047207fd3e6e9aaec14e0f4d9808d3bfabb8a1fc63d614fa743a2dd15ac377df55615c27bd656f125e3d50290152a54aa306fe278801ee01a3b193101e03874d2f680e677578a688fdcbdfcc2686f1f7b7574a7cc27cbcd07b6c4774193b70eebecd5c0cf9446f9f873b48015a115d85a2bd602e75465ed6ae0c80c8fcb582b5fb6c62f813c84cbf4c03c2ae5ccda233b78bd0f80239afc0d9f0b58d3807adfb510eee4fe540176b0d4a5badb5bb1817e03c6d74402fc991b41e172ff7dbdbea24d05e9a99346101d54899f874f1d5d295e5053ac510f0b755f27c95e5cfc5b8428eb05cf4fabb893994a589c036412d300e0bf30eff5fafcf2482fdeb52434b8e20de23d0d92fee35b127eee0bf6da3eab2cb5996c18d870578dadea86453893fa177c5e45845fad77b0e82eb7ad2a353dd99526cceb649212452ea283b4fb603cae02d7bd7270f65a13be496be6dee7667d3d197cd51e90d696dd0f414ce2d08b3dfc17a6d633e42f49a5a7db961073a830e481e240db2fece383e53cc0f5240086837b28503b60c4a24cf540c77c7cab1298bdd756013ea66a56d8930ffc3a96ad73f04dd54d8d29e6babd13d5d2c8f67210e04351b5f50e12a449c968657db8d386c7febb7064ea5ed492e9f78ee0b1082b064ddcf4421cd5f002ee25095c5339a8f1e49a8e023c03a71edfdb006fba73ccfd1029fca449af153a993423c0723d41f2f7e19fef843ceed93753df48de71a949d47842b2d8d9cae5e3c828d36e78a75044bb2bc3ecdab82fcc41afc06658e902a2e30453b3b85ce76652ec13ef2f1637274d7506d2bfa8150d80266754674e9f341d509c2df8576e79f5362607e650230227c13271cb705e9c7d469e5aab043979f67e77870c5e51df588c67886bacbad7d465be04ef749910906a2593e2fe0499086a767af5a32c2db49a72fc928aef4840e6ddfba22dbf48b28b71af3e799abb1bdc0351a1284d7521c1be9db642a5263c4929a98f28455fa2c39154babbda2dec25502cf7ed9fea145744a7e089688a19d0b57f47babddc1261821963b9cb8ce1a82d0d95d72899bf90105d9f7220ff87d9d149038a70eb1ab327874a8244ee91fde0d0f73c6c96f5f62c4dc71b3d90e596963c7760190340f18723c225f9604f308aeab639152c28c6d8ac6c2839ae5a769e9d0c545f4c7826ecf4af5f052d224a684f019e5d394138087437a55c323301abafabe663655333e152bd7fbd3bda9818bf1eb6f6a3d51141b5d70a49bdd8a3f5286f3a16ff0a8ec9411e9178a63c6778043391f84d0cf1a7d495babc760affc58a393f0f120c9b01ef39ab07c566d1bd74d9b26e0b2a8217afab552071ef000c4cf74903e486956aef813725e5016c360c2d74640654c6c318d736e32a684ce9f379ec2d66669002573f9e60bf8b57771fd5204eccd94cf72f8d5407a0d96ed114c853eafd6b8787826e7fb672b57ce8e3ee4d54d951986bfa0d1180ff5ef5e73fa589256425d6a73479ce69198528b26c2c794f3e0c9c45c0ccb40994ee516d8e92d419f12c98804c79693863aaffc04db246ee946f39982a35a157e7cc12cea53ddad6b1188a177a1e8179d475e5d9857991ca2b8d27a259fa0dc479669e85f3784e82385396779a9fd9ac2cc22b57ae8457a168eb1d7ef95755b9c61b423938ad499f787373450f2335eed9c7a62cbde1a7b8044832a3e7405dae2e86984288e5374fec51c8ddc3b4e5cf16f0668818aa48285c70ed1ed59c3c0ff94bc0712581c684f5717a5aa516dbcfec95dfc6df96a519e201d98d95e22fe6a0a569531a4d956800584afc36a92810227ddcc0723c16c80cbe2a253dc413a5f2bcde25770c33adf79de2ec26b5e73f6c25af22de2d447439bb697d88bee15882ea3aa7f927ea5661a08fb6a8799741eb3c1b5f0266ba6dd8823df620be9a69c03d7c49c3d82332094797c0e2ac7a90e8e4ade3c6e1aa71cca745d8df965c115f6b0b2151e593940b1d144a657ff36d13a9f1883b2c8e7aabfe2b42e3c2d98707a360c86303e4a3198fd8112d595c82db1084923ad60a82e0b17ce87db47f68", 0x1000}, {&(0x7f0000004100)="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", 0x1000}], 0x3, &(0x7f0000005680)=[{0xb0, 0x6, 0x5, "c9210ae022930b0dd3c5ce4eb83fe54d479cd0a4756f0805db0284bc11767e41d9230ead193a5027dadd809ef17522b3ad37a65ea4a0c118f049ae54582a1be3bf37118ba17a71982a5fc27c49da5c63b2784976692982d7eaf92e69acad13b19948bf6a645b2696c87648730a3a9e5506fbe21a015a4ff4f7368c84206958eb9ae1ddfdd2cf0fd7a26c37a4b5d929322f0caedfc5393844cacb1e59fe74b3"}, {0x70, 0x1be, 0x7bcb6e80, "db91f110471d19e020d94acb855a10ec57cec892e1c9b83a748aaa678669d1cc2778a84d9b813eb4675c2880cccde1d0345adc1e5f8259d86c9aadb7bde896d32a9730228e7147063c40454559c0cd2db660dc6eb545fba7fb1ab4971813"}, {0xf0, 0x101, 0x80, "891a19c088252f4c5550c9079b51c5c1bc1ff028817d4e0066b29fbef8f6b506712898b260669371dd9f03c5e53f2a574f51290e32ef3adbd59824ff1b296e63475efc4fddb46806c9d0399b27f03f060511c8eb5b79f409554b35e256afd22501704369093c75885a70b06261c72fdf90151ef4b0830998e64d10c74a5ec0d1ed0f2946737f315c92acaea196efa029fdaff7bab5519f9e365fe0cb55fec99be94d808f7aac9cf8be2977f4bcdac2dccd204c2f0e8bd36dd8f4ae6bdb95ccb77361ed610ccceec1393722744558b6404cbd1e626c85e2f0969d"}, {0x158, 0x107, 0x800, "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"}, {0x30, 0x0, 0x0, "e629d12bf4f7f890d2010d88bba651a667d8a6cdf103baf2e25e929ff691f5e7"}, {0xe0, 0x29, 0x1, "900b55edaf25ee158a63c30edeebb5d710773a1f4923b2b64c5377b925333bffaae3e7784a372b141f78c771d487237268c9758a32733e4ae3b8615432aae0ecdfe7b5624166e0e39267dcd19ca7b78df29387f771ea154a1f98c13357594891823c03db38c80aefd89b3d8adf6d4b5e97873173e098bbe73d92f32092e2f5da6b1806f21637f174f76ac4eff0f5a43241faccb04dbd931fd905afe3048792a00674c68bea9a7e3a57f0e5e7b5069ce4a28d3115ce11813f80475f807fe095edb00686bf7527d03bb51d62d5c73b96"}], 0x478}}], 0x4, 0x801) 08:53:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)=""/100, 0x64}, {&(0x7f0000000300)=""/221, 0xdd}, {&(0x7f0000000400)=""/55, 0x37}, {&(0x7f0000000440)=""/82, 0x52}, {&(0x7f00000004c0)=""/109, 0x6d}], 0x5, &(0x7f00000005c0)}, 0x4}, {{&(0x7f0000000600)=@nfc_llcp, 0x80, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=""/145, 0x91}}, {{&(0x7f0000000880)=@nl, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/155, 0x9b}], 0x1, &(0x7f0000000a00)=""/227, 0xe3}, 0x1}, {{&(0x7f0000000b00)=@alg, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000b80)=""/167, 0xa7}, {&(0x7f0000000c40)=""/26, 0x1a}, {&(0x7f0000000c80)=""/10, 0xa}, {&(0x7f0000000cc0)=""/128, 0x80}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/112, 0x70}], 0x6, &(0x7f0000001e40)=""/225, 0xe1}}], 0x4, 0x0, &(0x7f0000002040)={0x0, 0x3938700}) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x4000000000000085, 0x212401) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x110) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r1, 0xc00864c0, &(0x7f00000001c0)={r2}) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x101500, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x400, 0x20}) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = dup2(r0, r0) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000100)={0x3, 0x1, 0x8, 0xfffffff7, 0xad3, 0x0, 0x4}) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000080)={0x2, 0x0, [0x2, 0x7, 0x3, 0x0, 0x7, 0x6, 0xff, 0x4694ef96]}) 08:53:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4806) [ 1106.009809] FAULT_INJECTION: forcing a failure. [ 1106.009809] name failslab, interval 1, probability 0, space 0, times 0 08:53:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000100), 0x2, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1106.093690] CPU: 0 PID: 2810 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1106.101526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.110884] Call Trace: [ 1106.113498] dump_stack+0x1fc/0x2ef [ 1106.117152] should_fail.cold+0xa/0xf [ 1106.120976] ? setup_fault_attr+0x200/0x200 [ 1106.125307] ? lock_acquire+0x170/0x3c0 [ 1106.129290] __should_failslab+0x115/0x180 [ 1106.133532] should_failslab+0x5/0x10 [ 1106.137340] kmem_cache_alloc_trace+0x284/0x380 08:53:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/235}], 0x7, 0x8, 0x9) sendfile(r0, r0, &(0x7f00000000c0)=0x7fff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600b3d7c52ebf21a8d5c8c3b053cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009f400f80000ffffdf282032ffffff03e7779b000000110000000d60395a7088d7"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) [ 1106.142033] __do_execve_file+0x33b/0x2360 [ 1106.146276] ? open_exec+0x70/0x70 [ 1106.149888] ? __phys_addr+0x9a/0x110 [ 1106.153696] ? __check_object_size+0x17b/0x3e0 [ 1106.158285] do_execveat+0x3d/0x50 [ 1106.161844] __x64_sys_execveat+0xe1/0x120 [ 1106.166100] do_syscall_64+0xf9/0x620 [ 1106.169902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.175089] RIP: 0033:0x4665d9 [ 1106.178281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.197190] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1106.204997] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1106.212276] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1106.219559] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1106.226835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1106.234123] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 08:53:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x802, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x6, [@struct={0x0, 0x2, 0x0, 0x4, 0x1, 0x80000001, [{0x6, 0x4, 0x5}, {0x10, 0x0, 0x6722}]}, @ptr={0x1, 0x0, 0x0, 0x2, 0x3}, @restrict={0x2, 0x0, 0x0, 0xb, 0x5}, @const={0xd}, @struct={0xa, 0x5, 0x0, 0x4, 0x1, 0x6, [{0x1, 0x0, 0x4}, {0x9, 0x2, 0x700000}, {0x1, 0x1, 0x80000001}, {0xc, 0x2, 0x1000}, {0xa, 0x3, 0x3}]}]}, {0x0, [0x61, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000300)=""/64, 0xae, 0x40, 0x1}, 0x20) sendfile(r1, r2, &(0x7f0000000380)=0x9, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x3, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:16 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x10000, 0x8, 0x1, "3a58c2f2000834d3084725c1ffb58adb4db2571d3d9997582f8e73158c1ca881", 0x31435750}) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x7, 0xb, 0x4, 0x4, 0xffff8001, {0x77359400}, {0x3, 0xc, 0x9, 0x1f, 0x7, 0x40, "a9f16251"}, 0x2, 0x4, @userptr=0x9, 0x3}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x30280, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000140)={0x2, 0x1, [0x9, 0xfffffff9, 0xffff4a16, 0xab2, 0xe3c, 0x0, 0x6, 0x2]}) 08:53:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4807) 08:53:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x400, 0x4) 08:53:16 executing program 5 (fault-call:5 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = accept$ax25(r0, &(0x7f00000001c0)={{0x3, @rose}, [@remote, @remote, @remote, @remote, @remote, @remote, @rose, @rose]}, &(0x7f0000000240)=0x48) mmap(&(0x7f0000761000/0x2000)=nil, 0x2000, 0x280000e, 0x12, r1, 0xfffff000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000000402030000000020000600cefd10c125f1ba085b13c84ed24bc6cb00001e5fe10009e600f80000ffffffffff03000000110000000d60395a70889efcb77875ed2c7e9314aec67eb76ca4400a58a01b487c05326a1b587091794b568b0d584d8655158556e69e161b9fcf577e57146b25a5fe6e64e049abceca951aab9314745803345e781c5caa19e0f7aab01c8fa3a02d07306e459fc6aea6a84bab0128a47b16a99cf44a8c195f76011483134567a0be98165ed8ec61530b9f43415967c09362915eebbea12baf28"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) splice(r4, 0x0, r5, 0x0, 0x8000, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r4, 0x80045017, &(0x7f0000000300)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r3, 0x0) 08:53:16 executing program 2: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) splice(r0, 0x0, r1, 0x0, 0x8000, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000080)={0x3, 0x6}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f00000001c0)) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x8000, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r4, 0x40089413, &(0x7f0000000000)=0x3) ioctl$VIDIOC_G_CTRL(r3, 0xc0205649, &(0x7f0000000180)={0xcb099900}) [ 1106.434840] FAULT_INJECTION: forcing a failure. [ 1106.434840] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.480812] CPU: 1 PID: 2843 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1106.488654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.498008] Call Trace: [ 1106.500604] dump_stack+0x1fc/0x2ef [ 1106.504266] should_fail.cold+0xa/0xf [ 1106.508083] ? setup_fault_attr+0x200/0x200 [ 1106.512420] __should_failslab+0x115/0x180 [ 1106.516834] should_failslab+0x5/0x10 [ 1106.520644] kmem_cache_alloc+0x277/0x370 [ 1106.524801] prepare_creds+0x39/0x510 [ 1106.528607] prepare_exec_creds+0xd/0xf0 [ 1106.532670] __do_execve_file+0x3a9/0x2360 [ 1106.536908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1106.541671] ? open_exec+0x70/0x70 [ 1106.545225] ? retint_kernel+0x2d/0x2d [ 1106.549126] do_execveat+0x3d/0x50 [ 1106.552674] __x64_sys_execveat+0xe1/0x120 [ 1106.556914] do_syscall_64+0xf9/0x620 [ 1106.560724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.565997] RIP: 0033:0x4665d9 [ 1106.569186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.588088] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1106.595888] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 1106.603163] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1106.610452] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1106.617723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:53:17 executing program 3: fsync(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000040), 0x0, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000040)=""/14, 0x202c000, 0x1000, 0x6}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) [ 1106.624994] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 08:53:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0xa, 0xffff) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0xdf, 0x8}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/8, 0x8}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/205, 0xcd}], 0x3, &(0x7f0000000500)=""/231, 0xe7}, 0x1) r4 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4808) 08:53:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000040)={{@host, 0x1}, @any, 0x4, 0xfffffffffffffff9, 0x6, 0x3ff, 0x3, 0xfffffffd, 0x101}) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x80, 0x4) 08:53:17 executing program 5 (fault-call:5 fault-nth:8): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4848) 08:53:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f3b4c466000002ec9e4f97765ce27b903000600000000000000822000050000001902030000000020000600b3d7c52ebf21a8d5c8c3b053cefd90c125f1ba085b13c84ed24bc6cb0018fbb51851001e5fe10009e600f80000ffffffffff03000000110000000d6077e505d210a45547c085155bff7489ce006b1e691c6cb15547a0df769106f2795cd7e5690000"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r2, 0x0) 08:53:17 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r2, &(0x7f0000000040)={0x7}, 0x7) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r4, &(0x7f0000000040)={0x7}, 0x7) write$P9_RLERROR(r3, &(0x7f0000000080)={0xb, 0x7, 0x1, {0x2, '\xda/'}}, 0xb) openat$cgroup_ro(r4, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc0205649, &(0x7f0000000180)={0xfe, 0x80007}) 08:53:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x24000, 0x1000}, 0x20) r2 = signalfd(r0, &(0x7f0000000600)={[0x80000000]}, 0x8) r3 = perf_event_open$cgroup(&(0x7f00000004c0)={0x4, 0x80, 0x8, 0x8, 0x3d, 0x0, 0x0, 0x0, 0x473de3951dc7ab85, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000480)}, 0x4000, 0x8, 0x200, 0x8, 0x1ff, 0xf04, 0xa1, 0x0, 0x3f, 0x0, 0x200}, r2, 0xa, r2, 0x8) ioctl$BTRFS_IOC_SCRUB_CANCEL(r3, 0x941c, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000680)={&(0x7f0000000640)=""/48, 0x8000, 0x1000, 0x40, 0x2}, 0x20) r4 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xf4b, 0x6, &(0x7f00000003c0)=[{&(0x7f0000000140)="a9749a0cef467cbf10306bbdc8d124cb22c24bfc6a63c9bb117982a3532429d17849ba2074c535a1c66338adae0878b167694ee9a39fa26e7d", 0x39, 0x6}, {&(0x7f0000000180)="3d0d4ea61a4832ab09ef0668f584bb071f1ef7d98cfe9c9a97cd6e9fbbcd76ff46e2fa3476fdd9a96894c2e3f909623c589ee57d37f5815ad97984d53ab42602628c64da3226a7944620177454a638f145731b145f590aeacfaf7d53fd41c290288850fb0c6c06c84c589c6ffbbe45032e454b41a1e6c21469d10940acd5f7b431915ea0cc1108356cfb136e267c6a62d389e4bb0d50c8c6011463de62a442cf2fbd5610768bdcbb4ccf8a3a7174f0b2", 0xb0, 0x78e}, {&(0x7f0000000240)="340f5d447e840b062630b604ebefafc67ff7cd508a7f5460c8e68178d0b3f587a2c4711d46281b565793b01b04f17d8afc613f", 0x33, 0x1}, {&(0x7f0000000280)="abb2e0907f88c20f83799df659e7e3ff80a7b90de2f2cb598d66877537462d5b42e0d811ca7f7c5e26d4a528cb393c98fb9c0b0691279c01192e84c3bf9ad49a13552d1222e28132d1762cdcc8904d675bcb71e9fedc41fdb8188d82ae870c2583b6834498d4057a6b5ee102379d4bf358591ac516d0b0313d0e2ecbc4bb82d68f00b8ecf0cbc7b831380ba618cb43892051e3e662b37fc1ef10c6ca", 0x9c, 0x3}, {&(0x7f0000000340)="5674653ead46d34813ee982097950230a646a8b0cb64e4345e4766a1a92de4cc49ad2cc8f64911", 0x27, 0x5}, {&(0x7f0000000380)="d7e735f79e80ff8ee7fdf0a5589e2d948f5b6244", 0x14, 0x5}], 0x200888, &(0x7f00000006c0)=ANY=[@ANYBLOB="2e2f7d7d7b273a2c5d5d3a2b237d2d2b2e2a5c2c05000000000000005e238e2c7b5c5e2c7d2c2f5d5c2a2d4040292e5de32c736d61636b66736861743d402b2c6f626a5f747970653d042e7b2d272b29402f2c7063723d30303030303030303030303030303030303033372c008f1dcd9224966c21d80366bb61298637b97f57125259559c845862ca7b090094a061fbed5a4cb9ea709c407834424a07e926fe1a1098dd28b7f2fa7f4ea6227a2841070d63833adeac37321efd6266b3629daefd8dc45a6b59c23b9e7aca52fd980784876bb57bb7e13eb121f4cbce3582"]) preadv(r4, &(0x7f0000000540)=[{&(0x7f00000007c0)=""/102388, 0x18ff4}], 0x1, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0x80, 0x4) 08:53:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(r1, 0x10e, 0x9, 0x0, &(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 1106.903384] FAULT_INJECTION: forcing a failure. [ 1106.903384] name failslab, interval 1, probability 0, space 0, times 0 08:53:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x484c) [ 1106.998240] CPU: 0 PID: 2883 Comm: syz-executor.5 Not tainted 4.19.196-syzkaller #0 [ 1107.006057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.015411] Call Trace: [ 1107.018004] dump_stack+0x1fc/0x2ef [ 1107.021641] should_fail.cold+0xa/0xf [ 1107.025456] ? setup_fault_attr+0x200/0x200 [ 1107.029778] ? lock_acquire+0x170/0x3c0 [ 1107.033755] __should_failslab+0x115/0x180 [ 1107.037989] should_failslab+0x5/0x10 [ 1107.041786] kmem_cache_alloc_trace+0x284/0x380 [ 1107.046479] apparmor_file_alloc_security+0x394/0xad0 [ 1107.051688] ? apparmor_file_receive+0x160/0x160 [ 1107.056445] ? __alloc_file+0x21/0x330 [ 1107.060344] security_file_alloc+0x40/0x90 [ 1107.064582] __alloc_file+0xc9/0x330 [ 1107.068303] alloc_empty_file+0x6d/0x170 [ 1107.072375] path_openat+0xe9/0x2df0 [ 1107.076095] ? is_bpf_text_address+0xfc/0x1b0 [ 1107.080591] ? kernel_text_address+0xbd/0xf0 [ 1107.085038] ? __kernel_text_address+0x9/0x30 [ 1107.089533] ? unwind_get_return_address+0x51/0x90 [ 1107.094466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.099831] ? __kernel_text_address+0x9/0x30 [ 1107.104332] ? path_lookupat+0x8d0/0x8d0 [ 1107.108401] ? kasan_kmalloc+0x139/0x160 [ 1107.112463] do_filp_open+0x18c/0x3f0 [ 1107.116260] ? may_open_dev+0xf0/0xf0 [ 1107.120059] ? __lock_acquire+0x6de/0x3ff0 [ 1107.124299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1107.129057] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1107.133638] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1107.138391] ? rcu_nmi_exit+0xb3/0x180 [ 1107.142292] ? retint_kernel+0x2d/0x2d [ 1107.146191] do_open_execat+0x11d/0x5b0 [ 1107.150162] ? __do_execve_file+0x7c5/0x2360 [ 1107.154555] ? __se_sys_uselib+0x400/0x400 [ 1107.158778] ? check_preemption_disabled+0x41/0x280 [ 1107.163868] __do_execve_file+0x1a8b/0x2360 [ 1107.168184] ? open_exec+0x70/0x70 [ 1107.171708] ? check_preemption_disabled+0x41/0x280 [ 1107.176707] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1107.181891] ? __phys_addr+0x9a/0x110 [ 1107.185676] ? __check_object_size+0x17b/0x3e0 [ 1107.190243] do_execveat+0x3d/0x50 [ 1107.193770] __x64_sys_execveat+0xe1/0x120 [ 1107.197989] do_syscall_64+0xf9/0x620 [ 1107.201870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.207043] RIP: 0033:0x4665d9 [ 1107.210220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.229099] RSP: 002b:00007f004992f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1107.236789] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 08:53:17 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900}) r1 = syz_open_dev$vivid(&(0x7f00000001c0), 0x2, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000200)={0x7ffe, 0xffffff, "0105516971f25fd17b7a5f3c308c5ba0bea6e6870718321c", {0x2, 0x2}, 0x80000000}) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000000)={0x1, "f8832a5a7327ad1703abe67c9dc667f3f17592b0752b2d5a66e6275062ff3e8e", 0x5, 0x80, 0x3c, 0x5, 0x10, 0x2, 0x2, 0x4}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000300)) r3 = syz_open_dev$vcsu(&(0x7f0000000280), 0x4, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000140)={0x980000, 0x8, 0x3, r3, 0x0, &(0x7f0000000100)={0x9a0901, 0x4, '\x00', @string=&(0x7f00000002c0)=0x24}}) [ 1107.244145] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 1107.251402] RBP: 00007f004992f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 1107.258652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1107.265903] R13: 00007ffec0eee83f R14: 00007f004992f300 R15: 0000000000022000 08:53:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x4868) 08:53:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0xc, 0xd9f, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='bcache_write\x00', r0}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000003540), 0x0, 0xd9b, 0x4) sendfile(r1, r2, &(0x7f0000000140)=0x8, 0x7f) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000, 0x800}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000040)=0x1007f, 0x4) 08:53:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002180)=[{{&(0x7f0000000180)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f0000000240)=""/3, 0x3}, {&(0x7f0000000300)=""/119, 0x77}, {&(0x7f0000000380)=""/252, 0xfc}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x5, &(0x7f0000001500)=""/189, 0xbd}, 0x101}, {{&(0x7f00000015c0)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001640)=""/88, 0x58}, {&(0x7f00000016c0)=""/149, 0x95}], 0x2, &(0x7f00000017c0)}, 0x80fe}, {{&(0x7f0000001800)=@can, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001880)=""/118, 0x76}, {&(0x7f0000001900)=""/15, 0xf}, {&(0x7f0000001940)=""/59, 0x3b}, {&(0x7f0000001980)=""/111, 0x6f}], 0x4, &(0x7f0000001a40)=""/10, 0xa}, 0x9}, {{&(0x7f0000001a80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001b00)=""/212, 0xd4}, {&(0x7f0000001c00)=""/121, 0x79}, {&(0x7f0000001c80)=""/112, 0x70}, {&(0x7f0000001d00)=""/133, 0x85}], 0x4, &(0x7f0000001e00)=""/42, 0x2a}, 0xffffffb1}, {{&(0x7f0000001e40)=@xdp, 0x80, &(0x7f0000002140)=[{&(0x7f0000001ec0)=""/184, 0xb8}, {&(0x7f0000001f80)=""/185, 0xb9}, {&(0x7f0000002040)=""/76, 0x4c}, {&(0x7f00000020c0)=""/78, 0x4e}], 0x4, &(0x7f0000002400)=""/4096, 0x1000}, 0x2}], 0x5, 0x2040, &(0x7f00000022c0)={0x77359400}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0xbf, 0x9, 0x0, 0x0, 0x0, 0xc51, 0x44, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x0, 0x0, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\ao\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x00'/90, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = perf_event_open(&(0x7f0000002380)={0x3, 0x80, 0x0, 0x9, 0x81, 0x0, 0x0, 0xc51, 0x44, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xbdc4, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x9814, 0x9, 0x6, 0x8, 0x200, 0x9, 0x400, 0x0, 0xa, 0x0, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000100)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 08:53:18 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz0', "109a8ab80e17d88753453f1fba89b07f0abd556d0421c0e811011b6facd239a4d93a12215a93cea00cd357aaafc8839cee2a0ec080f21ec111454da08fdf4f5e152621db580b78dd064e950c591d5ef2383d7e87624af100286a615c3b17867e77b91f1aef3439dc3a192af96d026c2430cf8eb6c1c4b097d2cd334b2d0bbf71ad238c5ebd2f03cbcef26c9345a9ccd4472afef8a88b5914263525b895dc38a035b155d510160e9a892d995bc7fea78eca98281ce07b88e9c3b321f602537ec38fc4eb2696107e60efd16a8dc2be5ad37bd1eb88eb3606f6fcce1f7241bbde59d855"}, 0xe6) ioctl$VIDIOC_G_CTRL(r0, 0xc0205649, &(0x7f0000000180)={0xcb099900, 0x800000}) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0xfffffffffffffd75, 0x21, 0xfffe}, 0x7) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r2}, 0x3fd, 0x100000000, 0x6}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000140)={0x0, 0x6}) write$P9_RSYMLINK(r1, &(0x7f0000000100)={0x14, 0x11, 0x1, {0x20, 0x3, 0x6}}, 0x14) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x7}, 0x7) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000040)={0xf, 0x0, 0x4, {0x7fffffff, 0x8, 0x0, 0x8}}) 08:53:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000800), 0x486c) [ 1109.651117] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1109.659908] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1109.668285] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1109.676005] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1109.683640] device bridge_slave_1 left promiscuous mode [ 1109.690278] bridge0: port 2(bridge_slave_1) entered disabled state [ 1109.697819] device bridge_slave_0 left promiscuous mode [ 1109.703278] bridge0: port 1(bridge_slave_0) entered disabled state [ 1109.712789] device veth1_macvtap left promiscuous mode [ 1109.718431] device veth0_macvtap left promiscuous mode [ 1109.723774] device veth1_vlan left promiscuous mode [ 1109.729210] device veth0_vlan left promiscuous mode [ 1113.807173] device hsr_slave_1 left promiscuous mode [ 1113.815432] device hsr_slave_0 left promiscuous mode [ 1113.828915] team0 (unregistering): Port device team_slave_1 removed [ 1113.842613] team0 (unregistering): Port device team_slave_0 removed [ 1113.852127] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1113.862833] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1113.892992] bond0 (unregistering): Released all slaves [ 1113.911204] IPVS: ftp: loaded support on port[0] = 21 [ 1114.009033] chnl_net:caif_netlink_parms(): no params data found [ 1114.109061] bridge0: port 1(bridge_slave_0) entered blocking state [ 1114.119102] bridge0: port 1(bridge_slave_0) entered disabled state [ 1114.129379] device bridge_slave_0 entered promiscuous mode [ 1114.141329] bridge0: port 2(bridge_slave_1) entered blocking state [ 1114.149297] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.161060] device bridge_slave_1 entered promiscuous mode [ 1114.190309] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1114.200125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1114.230337] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1114.242352] team0: Port device team_slave_0 added [ 1114.249478] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1114.261794] team0: Port device team_slave_1 added [ 1114.289794] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1114.299720] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1114.329622] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1114.342429] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1114.353227] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1114.382779] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1114.398682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1114.407305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1114.438634] device hsr_slave_0 entered promiscuous mode [ 1114.449434] device hsr_slave_1 entered promiscuous mode [ 1114.456196] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1114.463400] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1114.583011] bridge0: port 2(bridge_slave_1) entered blocking state [ 1114.589414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1114.596203] bridge0: port 1(bridge_slave_0) entered blocking state [ 1114.602556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1114.663032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1114.673550] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1114.688703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1114.698940] bridge0: port 1(bridge_slave_0) entered disabled state [ 1114.707379] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.727447] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1114.733574] 8021q: adding VLAN 0 to HW filter on device team0 [ 1114.745987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1114.753741] bridge0: port 1(bridge_slave_0) entered blocking state [ 1114.760204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1114.779834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1114.788031] bridge0: port 2(bridge_slave_1) entered blocking state [ 1114.794487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1114.817265] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1114.827957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1114.836998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1114.852925] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1114.864735] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1114.870795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1114.878574] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1114.886391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1114.900799] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1114.911056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1114.917903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1114.941054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1114.975193] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1114.985251] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1114.992508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1115.002026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1115.028961] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1115.036284] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1115.042939] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1115.052724] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1115.060169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1115.068219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1115.078210] device veth0_vlan entered promiscuous mode [ 1115.085773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1115.092681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1115.106049] device veth1_vlan entered promiscuous mode [ 1115.111869] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1115.121735] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1115.134237] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1115.143078] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1115.150081] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1115.157593] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1115.165367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1115.173028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1115.182543] device veth0_macvtap entered promiscuous mode [ 1115.189225] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1115.198205] device veth1_macvtap entered promiscuous mode [ 1115.204895] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1115.213546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1115.223148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1115.232215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1115.242491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1115.251782] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1115.262064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1115.272427] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1115.279853] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1115.287042] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1115.295042] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1115.302147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1115.310106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1115.319826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1115.330020] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1115.339642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1115.350040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1115.360384] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1115.367720] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1115.375237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1115.383223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1115.500779] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1115.507313] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1115.524540] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1115.533151] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1115.540626] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1115.540880] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1115.555277] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1115.562162] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1116.725632] ieee802154 phy0 wpan0: encryption failed: -22 [ 1116.731185] ieee802154 phy1 wpan1: encryption failed: -22 [ 1117.649105] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1117.658969] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1117.667136] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1117.675418] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1117.683003] device bridge_slave_1 left promiscuous mode [ 1117.689590] bridge0: port 2(bridge_slave_1) entered disabled state [ 1117.697683] device bridge_slave_0 left promiscuous mode [ 1117.703254] bridge0: port 1(bridge_slave_0) entered disabled state [ 1117.712953] device veth1_macvtap left promiscuous mode [ 1117.718332] device veth0_macvtap left promiscuous mode [ 1117.723632] device veth1_vlan left promiscuous mode [ 1117.728836] device veth0_vlan left promiscuous mode [ 1120.403571] Bluetooth: hci2: command 0x0409 tx timeout [ 1121.751786] device hsr_slave_1 left promiscuous mode [ 1121.759549] device hsr_slave_0 left promiscuous mode [ 1121.775155] team0 (unregistering): Port device team_slave_1 removed [ 1121.785906] team0 (unregistering): Port device team_slave_0 removed [ 1121.795382] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1121.806252] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1121.834429] bond0 (unregistering): Released all slaves [ 1121.852380] IPVS: ftp: loaded support on port[0] = 21 [ 1121.949659] chnl_net:caif_netlink_parms(): no params data found [ 1122.030423] bridge0: port 1(bridge_slave_0) entered blocking state [ 1122.040680] bridge0: port 1(bridge_slave_0) entered disabled state [ 1122.048977] device bridge_slave_0 entered promiscuous mode [ 1122.060508] bridge0: port 2(bridge_slave_1) entered blocking state [ 1122.067440] bridge0: port 2(bridge_slave_1) entered disabled state [ 1122.078569] device bridge_slave_1 entered promiscuous mode [ 1122.108066] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1122.118239] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1122.150017] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1122.158434] team0: Port device team_slave_0 added [ 1122.164840] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1122.172433] team0: Port device team_slave_1 added [ 1122.201687] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1122.208356] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1122.237928] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1122.260917] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1122.268909] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1122.301997] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1122.317359] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1122.325441] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1122.355586] device hsr_slave_0 entered promiscuous mode [ 1122.361396] device hsr_slave_1 entered promiscuous mode [ 1122.371718] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1122.379404] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1122.483376] Bluetooth: hci2: command 0x041b tx timeout [ 1122.511198] bridge0: port 2(bridge_slave_1) entered blocking state [ 1122.517614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1122.524335] bridge0: port 1(bridge_slave_0) entered blocking state [ 1122.530709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1122.588625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1122.601716] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1122.612734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1122.625218] bridge0: port 1(bridge_slave_0) entered disabled state [ 1122.632146] bridge0: port 2(bridge_slave_1) entered disabled state [ 1122.649216] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1122.655963] 8021q: adding VLAN 0 to HW filter on device team0 [ 1122.668984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1122.677681] bridge0: port 1(bridge_slave_0) entered blocking state [ 1122.684090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1122.705316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1122.712977] bridge0: port 2(bridge_slave_1) entered blocking state [ 1122.719477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1122.732318] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1122.744888] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1122.762920] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1122.778418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1122.789851] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1122.801624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1122.810325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1122.822702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1122.840332] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1122.851969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1122.862228] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1122.871453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1122.879857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1122.898125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1122.919178] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1122.931043] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1122.938132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1122.947444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1122.978716] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1122.986465] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1122.993113] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1123.003898] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1123.010514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1123.018616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1123.027770] device veth0_vlan entered promiscuous mode [ 1123.037088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1123.044268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1123.054914] device veth1_vlan entered promiscuous mode [ 1123.060685] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1123.069989] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1123.081601] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1123.091125] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1123.098534] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1123.106302] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1123.114122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1123.121723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1123.132392] device veth0_macvtap entered promiscuous mode [ 1123.138994] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1123.147727] device veth1_macvtap entered promiscuous mode [ 1123.154806] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1123.163720] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1123.172775] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1123.181598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1123.191567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1123.200787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1123.210575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1123.220807] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1123.227928] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1123.235899] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1123.243162] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1123.250531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1123.258518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1123.268786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1123.278924] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1123.288433] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1123.298252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1123.308669] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1123.315741] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1123.322908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1123.330909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1123.466024] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1123.472994] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1123.490193] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1123.493371] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1123.502362] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1123.504610] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1123.513494] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1123.528032] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1125.578402] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1125.588275] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1125.596678] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1125.604150] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1125.611920] device bridge_slave_1 left promiscuous mode [ 1125.617930] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.625614] device bridge_slave_0 left promiscuous mode [ 1125.631058] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.641171] device veth1_macvtap left promiscuous mode [ 1125.646647] device veth0_macvtap left promiscuous mode [ 1125.651946] device veth1_vlan left promiscuous mode [ 1125.657238] device veth0_vlan left promiscuous mode [ 1128.402802] Bluetooth: hci2: command 0x0409 tx timeout [ 1129.691091] device hsr_slave_1 left promiscuous mode [ 1129.698493] device hsr_slave_0 left promiscuous mode [ 1129.710799] team0 (unregistering): Port device team_slave_1 removed [ 1129.721814] team0 (unregistering): Port device team_slave_0 removed [ 1129.731240] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1129.741444] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1129.774068] bond0 (unregistering): Released all slaves [ 1129.788623] IPVS: ftp: loaded support on port[0] = 21 [ 1129.885029] chnl_net:caif_netlink_parms(): no params data found [ 1129.977857] bridge0: port 1(bridge_slave_0) entered blocking state [ 1129.985181] bridge0: port 1(bridge_slave_0) entered disabled state [ 1129.997629] device bridge_slave_0 entered promiscuous mode [ 1130.005310] bridge0: port 2(bridge_slave_1) entered blocking state [ 1130.011730] bridge0: port 2(bridge_slave_1) entered disabled state [ 1130.024213] device bridge_slave_1 entered promiscuous mode [ 1130.055353] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1130.066410] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1130.093664] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1130.102244] team0: Port device team_slave_0 added [ 1130.111924] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1130.119971] team0: Port device team_slave_1 added [ 1130.150285] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1130.156743] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1130.185865] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1130.198641] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1130.208616] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1130.238100] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1130.249563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1130.261155] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1130.291534] device hsr_slave_0 entered promiscuous mode [ 1130.301105] device hsr_slave_1 entered promiscuous mode [ 1130.308349] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1130.319430] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1130.436560] bridge0: port 2(bridge_slave_1) entered blocking state [ 1130.442975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1130.449616] bridge0: port 1(bridge_slave_0) entered blocking state [ 1130.456024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1130.482506] Bluetooth: hci2: command 0x041b tx timeout [ 1130.514480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1130.525050] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1130.539713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1130.547837] bridge0: port 1(bridge_slave_0) entered disabled state [ 1130.559665] bridge0: port 2(bridge_slave_1) entered disabled state [ 1130.579519] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1130.586590] 8021q: adding VLAN 0 to HW filter on device team0 [ 1130.598426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1130.607686] bridge0: port 1(bridge_slave_0) entered blocking state [ 1130.614112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1130.634419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1130.642147] bridge0: port 2(bridge_slave_1) entered blocking state [ 1130.648531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1130.674411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1130.682548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1130.690330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1130.699987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1130.709261] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1130.716492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1130.724431] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1130.742180] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1130.755278] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1130.762031] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1130.780776] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1130.800061] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1130.812168] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1130.820432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1130.830396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1130.884473] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1130.891585] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1130.899101] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1130.908658] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1130.915454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1130.923398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1130.932186] device veth0_vlan entered promiscuous mode [ 1130.942986] device veth1_vlan entered promiscuous mode [ 1130.948918] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1130.956598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1130.964488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1130.971444] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1130.982154] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1130.995444] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1131.006461] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1131.013997] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1131.021280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1131.029374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1131.039093] device veth0_macvtap entered promiscuous mode [ 1131.045870] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1131.055793] device veth1_macvtap entered promiscuous mode [ 1131.061889] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1131.073152] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1131.082213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1131.091446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1131.101997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1131.111485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1131.121471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1131.131627] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1131.138898] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1131.145757] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1131.153700] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1131.161561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1131.171316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1131.181260] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1131.191333] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1131.200623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1131.210444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1131.220618] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1131.228275] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1131.234968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1131.244483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1131.356561] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1131.363589] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1131.380170] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1131.386188] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1131.393170] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1131.400279] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1131.401017] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1131.415883] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1133.437496] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1133.447528] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1133.455834] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1133.463993] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1133.471740] device bridge_slave_1 left promiscuous mode [ 1133.478190] bridge0: port 2(bridge_slave_1) entered disabled state [ 1133.486128] device bridge_slave_0 left promiscuous mode [ 1133.491581] bridge0: port 1(bridge_slave_0) entered disabled state [ 1133.501257] device veth1_macvtap left promiscuous mode [ 1133.506844] device veth0_macvtap left promiscuous mode [ 1133.512295] device veth1_vlan left promiscuous mode [ 1133.517379] device veth0_vlan left promiscuous mode [ 1136.161947] Bluetooth: hci2: command 0x0409 tx timeout [ 1137.570561] device hsr_slave_1 left promiscuous mode [ 1137.578024] device hsr_slave_0 left promiscuous mode [ 1137.593985] team0 (unregistering): Port device team_slave_1 removed [ 1137.603993] team0 (unregistering): Port device team_slave_0 removed [ 1137.613793] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1137.624231] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1137.654880] bond0 (unregistering): Released all slaves [ 1137.669476] IPVS: ftp: loaded support on port[0] = 21 [ 1137.791412] chnl_net:caif_netlink_parms(): no params data found [ 1137.893031] bridge0: port 1(bridge_slave_0) entered blocking state [ 1137.899783] bridge0: port 1(bridge_slave_0) entered disabled state [ 1137.911483] device bridge_slave_0 entered promiscuous mode [ 1137.919939] bridge0: port 2(bridge_slave_1) entered blocking state [ 1137.930138] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.938131] device bridge_slave_1 entered promiscuous mode [ 1137.970563] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1137.980834] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1138.010319] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1138.019201] team0: Port device team_slave_0 added [ 1138.029283] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1138.038717] team0: Port device team_slave_1 added [ 1138.068250] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1138.076085] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1138.106208] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1138.119185] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1138.130291] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1138.159823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1138.176540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1138.184212] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1138.220897] device hsr_slave_0 entered promiscuous mode [ 1138.227216] device hsr_slave_1 entered promiscuous mode [ 1138.237340] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1138.244142] Bluetooth: hci2: command 0x041b tx timeout [ 1138.250369] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1138.376101] bridge0: port 2(bridge_slave_1) entered blocking state [ 1138.382510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1138.389185] bridge0: port 1(bridge_slave_0) entered blocking state [ 1138.395626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1138.454395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1138.467735] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1138.479044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1138.493796] bridge0: port 1(bridge_slave_0) entered disabled state [ 1138.500632] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.519046] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1138.526643] 8021q: adding VLAN 0 to HW filter on device team0 [ 1138.541274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1138.551273] bridge0: port 1(bridge_slave_0) entered blocking state [ 1138.557695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1138.588308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1138.597189] bridge0: port 2(bridge_slave_1) entered blocking state [ 1138.603600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1138.613277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1138.632443] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1138.642336] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1138.655061] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1138.664187] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1138.672939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1138.680752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1138.689399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1138.705067] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1138.712785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1138.720281] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1138.728676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1138.735566] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1138.748908] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1138.761175] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1138.770570] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1138.779488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1138.788423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1138.816347] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1138.823977] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1138.830631] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1138.841477] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1138.850866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1138.858561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1138.868659] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1138.876496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1138.891998] device veth0_vlan entered promiscuous mode [ 1138.900817] device veth1_vlan entered promiscuous mode [ 1138.907465] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1138.916545] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1138.928868] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1138.938454] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1138.945967] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1138.953928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1138.961164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1138.969139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1138.978429] device veth0_macvtap entered promiscuous mode [ 1138.985145] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1138.994315] device veth1_macvtap entered promiscuous mode [ 1139.000382] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1139.009563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1139.019636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1139.028628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1139.038530] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1139.048013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1139.057779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1139.067888] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1139.075387] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1139.082277] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1139.089587] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1139.096942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1139.105031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1139.129788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1139.142749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1139.153139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1139.163242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1139.174090] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1139.181002] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1139.190024] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1139.197898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1139.318338] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1139.325630] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1139.345888] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1139.350470] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1139.361039] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1139.373024] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1139.373031] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1139.392808] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1141.476378] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1141.483627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1141.491455] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1141.498172] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1141.506771] device bridge_slave_1 left promiscuous mode [ 1141.512402] bridge0: port 2(bridge_slave_1) entered disabled state [ 1141.519622] device bridge_slave_0 left promiscuous mode [ 1141.525510] bridge0: port 1(bridge_slave_0) entered disabled state [ 1141.535049] device veth1_macvtap left promiscuous mode [ 1141.540474] device veth0_macvtap left promiscuous mode [ 1141.545938] device veth1_vlan left promiscuous mode [ 1141.550993] device veth0_vlan left promiscuous mode [ 1144.171415] Bluetooth: hci2: command 0x0409 tx timeout [ 1145.649615] device hsr_slave_1 left promiscuous mode [ 1145.657212] device hsr_slave_0 left promiscuous mode [ 1145.670556] team0 (unregistering): Port device team_slave_1 removed [ 1145.684531] team0 (unregistering): Port device team_slave_0 removed [ 1145.694641] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1145.707077] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1145.736083] bond0 (unregistering): Released all slaves [ 1145.753332] IPVS: ftp: loaded support on port[0] = 21 [ 1145.845678] chnl_net:caif_netlink_parms(): no params data found [ 1145.922501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1145.928948] bridge0: port 1(bridge_slave_0) entered disabled state [ 1145.937851] device bridge_slave_0 entered promiscuous mode [ 1145.946287] bridge0: port 2(bridge_slave_1) entered blocking state [ 1145.954594] bridge0: port 2(bridge_slave_1) entered disabled state [ 1145.963062] device bridge_slave_1 entered promiscuous mode [ 1145.986883] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1145.997126] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1146.021576] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1146.029254] team0: Port device team_slave_0 added [ 1146.036979] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1146.045540] team0: Port device team_slave_1 added [ 1146.067257] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1146.074091] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1146.102492] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1146.115327] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1146.122701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1146.148834] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1146.161452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1146.169167] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1146.196862] device hsr_slave_0 entered promiscuous mode [ 1146.203022] device hsr_slave_1 entered promiscuous mode [ 1146.209287] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1146.218657] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1146.251084] Bluetooth: hci2: command 0x041b tx timeout [ 1146.341828] bridge0: port 2(bridge_slave_1) entered blocking state [ 1146.348206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1146.354939] bridge0: port 1(bridge_slave_0) entered blocking state [ 1146.361457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1146.423074] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1146.438228] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1146.448721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1146.461354] bridge0: port 1(bridge_slave_0) entered disabled state [ 1146.468189] bridge0: port 2(bridge_slave_1) entered disabled state [ 1146.486174] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1146.496054] 8021q: adding VLAN 0 to HW filter on device team0 [ 1146.508718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1146.521865] bridge0: port 1(bridge_slave_0) entered blocking state [ 1146.528217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1146.555963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1146.564392] bridge0: port 2(bridge_slave_1) entered blocking state [ 1146.570809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1146.601958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1146.610026] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1146.619872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1146.628511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1146.639693] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1146.646560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1146.655589] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1146.670341] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1146.683562] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1146.690299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1146.708211] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1146.726072] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1146.737287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1146.808230] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1146.819295] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1146.827862] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1146.844656] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1146.852894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1146.860494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1146.869877] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1146.878836] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1146.889152] device veth0_vlan entered promiscuous mode [ 1146.906830] device veth1_vlan entered promiscuous mode [ 1146.915656] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1146.928445] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1146.947897] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1146.957938] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1146.965274] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1146.972647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1146.979817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1146.988093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1146.997818] device veth0_macvtap entered promiscuous mode [ 1147.004487] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1147.013194] device veth1_macvtap entered promiscuous mode [ 1147.019460] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1147.028547] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1147.037956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1147.047713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1147.057490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1147.066847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1147.076587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1147.086761] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1147.093964] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1147.104282] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1147.117813] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1147.125312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1147.133212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1147.143309] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1147.153467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1147.164130] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1147.174627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1147.185266] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1147.193050] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1147.199841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1147.208819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1147.327546] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1147.335165] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1147.358327] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1147.363618] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1147.373216] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1147.384922] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1147.394959] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1147.406644] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1149.465361] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1149.472719] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1149.480788] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1149.487521] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1149.495529] device bridge_slave_1 left promiscuous mode [ 1149.501863] bridge0: port 2(bridge_slave_1) entered disabled state [ 1149.509140] device bridge_slave_0 left promiscuous mode [ 1149.514890] bridge0: port 1(bridge_slave_0) entered disabled state [ 1149.524246] device veth1_macvtap left promiscuous mode [ 1149.529557] device veth0_macvtap left promiscuous mode [ 1149.535100] device veth1_vlan left promiscuous mode [ 1149.540159] device veth0_vlan left promiscuous mode [ 1152.400240] Bluetooth: hci2: command 0x0409 tx timeout [ 1153.656982] device hsr_slave_1 left promiscuous mode [ 1153.664575] device hsr_slave_0 left promiscuous mode [ 1153.681644] team0 (unregistering): Port device team_slave_1 removed [ 1153.691426] team0 (unregistering): Port device team_slave_0 removed [ 1153.703313] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1153.713768] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1153.745349] bond0 (unregistering): Released all slaves [ 1153.759417] IPVS: ftp: loaded support on port[0] = 21 [ 1153.857056] chnl_net:caif_netlink_parms(): no params data found [ 1153.947663] bridge0: port 1(bridge_slave_0) entered blocking state [ 1153.957007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1153.967199] device bridge_slave_0 entered promiscuous mode [ 1153.978842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1153.988274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1153.999203] device bridge_slave_1 entered promiscuous mode [ 1154.033321] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1154.044537] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1154.076471] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1154.085400] team0: Port device team_slave_0 added [ 1154.096023] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1154.105270] team0: Port device team_slave_1 added [ 1154.133893] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1154.141580] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1154.171479] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1154.185911] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1154.194399] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1154.224938] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1154.238269] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1154.250719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1154.284444] device hsr_slave_0 entered promiscuous mode [ 1154.291225] device hsr_slave_1 entered promiscuous mode [ 1154.297536] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1154.308805] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1154.424083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1154.430488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1154.437138] bridge0: port 1(bridge_slave_0) entered blocking state [ 1154.443545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1154.487320] Bluetooth: hci2: command 0x041b tx timeout [ 1154.517027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1154.531117] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1154.546447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1154.555369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1154.565657] bridge0: port 2(bridge_slave_1) entered disabled state [ 1154.576790] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1154.587913] 8021q: adding VLAN 0 to HW filter on device team0 [ 1154.599535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1154.612093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1154.618442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1154.645822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1154.654459] bridge0: port 2(bridge_slave_1) entered blocking state [ 1154.660866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1154.673906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1154.693909] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1154.701709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1154.709472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1154.717439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1154.728433] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1154.735440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1154.752802] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1154.763175] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1154.771272] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1154.784255] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1154.799277] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1154.815284] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1154.822887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1154.835155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1154.877687] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1154.885660] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1154.893429] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1154.903412] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1154.910320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1154.917946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1154.926103] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1154.933346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1154.942298] device veth0_vlan entered promiscuous mode [ 1154.953257] device veth1_vlan entered promiscuous mode [ 1154.959065] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1154.968468] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1154.979667] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1154.989541] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1154.996505] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1155.004013] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1155.011400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1155.019031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1155.029592] device veth0_macvtap entered promiscuous mode [ 1155.037562] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1155.046429] device veth1_macvtap entered promiscuous mode [ 1155.052957] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1155.062180] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1155.072635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1155.081747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1155.091992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1155.101299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1155.111091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1155.121750] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1155.128718] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1155.136207] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1155.143856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1155.151625] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1155.159319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1155.169386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1155.179354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1155.188889] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1155.198710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1155.209031] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1155.216079] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1155.223093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1155.231140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1155.343011] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1155.349685] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1155.368159] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1155.373646] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1155.386863] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1155.387550] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1155.395643] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1155.407745] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1157.425239] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1157.433588] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1157.442924] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1157.450038] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1157.457859] device bridge_slave_1 left promiscuous mode [ 1157.463762] bridge0: port 2(bridge_slave_1) entered disabled state [ 1157.471618] device bridge_slave_0 left promiscuous mode [ 1157.477068] bridge0: port 1(bridge_slave_0) entered disabled state [ 1157.486665] device veth1_macvtap left promiscuous mode [ 1157.492105] device veth0_macvtap left promiscuous mode [ 1157.497408] device veth1_vlan left promiscuous mode [ 1157.502626] device veth0_vlan left promiscuous mode [ 1160.479373] Bluetooth: hci2: command 0x0409 tx timeout [ 1161.614438] device hsr_slave_1 left promiscuous mode [ 1161.622089] device hsr_slave_0 left promiscuous mode [ 1161.639232] team0 (unregistering): Port device team_slave_1 removed [ 1161.648344] team0 (unregistering): Port device team_slave_0 removed [ 1161.658530] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1161.668704] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1161.702571] bond0 (unregistering): Released all slaves [ 1161.717522] IPVS: ftp: loaded support on port[0] = 21 [ 1161.826302] chnl_net:caif_netlink_parms(): no params data found [ 1161.921112] bridge0: port 1(bridge_slave_0) entered blocking state [ 1161.927541] bridge0: port 1(bridge_slave_0) entered disabled state [ 1161.936497] device bridge_slave_0 entered promiscuous mode [ 1161.945492] bridge0: port 2(bridge_slave_1) entered blocking state [ 1161.953156] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.961402] device bridge_slave_1 entered promiscuous mode [ 1161.985443] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1161.995669] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1162.024665] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1162.035673] team0: Port device team_slave_0 added [ 1162.043695] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1162.054752] team0: Port device team_slave_1 added [ 1162.084879] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1162.094457] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.124432] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1162.138846] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1162.149398] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.178920] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1162.194625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1162.203927] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1162.234945] device hsr_slave_0 entered promiscuous mode [ 1162.244971] device hsr_slave_1 entered promiscuous mode [ 1162.252866] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1162.264954] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1162.388083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.394490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.401189] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.407549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1162.467549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1162.482453] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1162.496465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1162.504944] bridge0: port 1(bridge_slave_0) entered disabled state [ 1162.515465] bridge0: port 2(bridge_slave_1) entered disabled state [ 1162.526107] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1162.533403] 8021q: adding VLAN 0 to HW filter on device team0 [ 1162.544746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1162.553303] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.559709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1162.579321] Bluetooth: hci2: command 0x041b tx timeout [ 1162.587283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1162.597160] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.603539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.611520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1162.624994] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1162.632341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1162.644423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1162.661805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1162.676123] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1162.682952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1162.705136] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1162.716997] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1162.725807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1162.742742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1162.765689] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1162.782768] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1162.793252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1162.806623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1162.861627] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1162.868671] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1162.876085] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1162.886699] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1162.893637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1162.901133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1162.911804] device veth0_vlan entered promiscuous mode [ 1162.919614] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1162.926555] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1162.936231] device veth1_vlan entered promiscuous mode [ 1162.943793] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1162.952867] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1162.965319] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1162.975319] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1162.982560] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1162.990459] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1162.997661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1163.005797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1163.016149] device veth0_macvtap entered promiscuous mode [ 1163.023886] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1163.032992] device veth1_macvtap entered promiscuous mode [ 1163.039255] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1163.047901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1163.057495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1163.066324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1163.076144] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.085365] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1163.095170] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.105265] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1163.112763] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1163.120963] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1163.128218] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1163.135662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1163.143555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1163.153492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1163.163442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.172719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1163.182541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1163.193139] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1163.200256] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1163.207112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1163.215243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1163.325350] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1163.331902] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1163.340598] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1163.363985] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1163.374399] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1163.381017] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1163.388137] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1163.395248] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1165.426656] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1165.433443] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1165.443547] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1165.451076] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1165.459993] device bridge_slave_1 left promiscuous mode [ 1165.465456] bridge0: port 2(bridge_slave_1) entered disabled state [ 1165.473124] device bridge_slave_0 left promiscuous mode [ 1165.479031] bridge0: port 1(bridge_slave_0) entered disabled state [ 1165.488214] device veth1_macvtap left promiscuous mode [ 1165.493681] device veth0_macvtap left promiscuous mode [ 1165.499193] device veth1_vlan left promiscuous mode [ 1165.504380] device veth0_vlan left promiscuous mode [ 1168.398376] Bluetooth: hci2: command 0x0409 tx timeout [ 1169.544793] device hsr_slave_1 left promiscuous mode [ 1169.552360] device hsr_slave_0 left promiscuous mode [ 1169.566701] team0 (unregistering): Port device team_slave_1 removed [ 1169.580769] team0 (unregistering): Port device team_slave_0 removed [ 1169.590940] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1169.601298] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1169.632318] bond0 (unregistering): Released all slaves [ 1169.647343] IPVS: ftp: loaded support on port[0] = 21 [ 1169.740489] chnl_net:caif_netlink_parms(): no params data found [ 1169.818634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.825058] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.836148] device bridge_slave_0 entered promiscuous mode [ 1169.844074] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.854229] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.862041] device bridge_slave_1 entered promiscuous mode [ 1169.890321] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1169.903469] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1169.931351] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1169.942962] team0: Port device team_slave_0 added [ 1169.949260] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1169.956883] team0: Port device team_slave_1 added [ 1169.982222] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1169.992206] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1170.021904] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1170.034187] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1170.045256] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1170.074317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1170.095210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1170.103339] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1170.137330] device hsr_slave_0 entered promiscuous mode [ 1170.143806] device hsr_slave_1 entered promiscuous mode [ 1170.153615] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1170.162211] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1170.281531] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.287904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1170.294575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.300995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1170.357991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1170.372469] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1170.383815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1170.395390] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.402552] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.418612] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1170.424673] 8021q: adding VLAN 0 to HW filter on device team0 [ 1170.436109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1170.444680] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.451092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1170.470601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1170.479496] bridge0: port 2(bridge_slave_1) entered blocking state [ 1170.485821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1170.494149] Bluetooth: hci2: command 0x041b tx timeout [ 1170.504002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1170.520883] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1170.532377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1170.553204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1170.561229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1170.575718] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1170.582807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1170.603254] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1170.615358] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1170.624719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1170.641314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1170.661801] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1170.675371] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1170.683646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1170.691931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1170.745570] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1170.756226] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1170.763443] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1170.773918] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1170.780955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1170.788611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1170.796884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1170.804194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1170.812627] device veth0_vlan entered promiscuous mode [ 1170.822842] device veth1_vlan entered promiscuous mode [ 1170.828948] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1170.837611] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1170.850166] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1170.859993] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1170.866963] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1170.874677] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1170.881935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1170.889927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1170.901363] device veth0_macvtap entered promiscuous mode [ 1170.907544] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1170.917156] device veth1_macvtap entered promiscuous mode [ 1170.923752] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1170.933364] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1170.943626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1170.952694] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1170.963070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1170.972637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1170.982843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1170.993770] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1171.001506] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1171.009086] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1171.016285] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1171.023645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1171.031769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1171.042169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1171.052013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1171.061217] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1171.071036] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1171.081156] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1171.088253] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1171.095477] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1171.103658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1171.210535] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1171.217376] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1171.235041] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1171.239660] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1171.242489] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1171.256774] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1171.256987] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1171.273223] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1173.292989] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1173.302753] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1173.311330] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1173.319591] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1173.327508] device bridge_slave_1 left promiscuous mode [ 1173.333872] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.341765] device bridge_slave_0 left promiscuous mode [ 1173.347230] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.356818] device veth1_macvtap left promiscuous mode [ 1173.362426] device veth0_macvtap left promiscuous mode [ 1173.367898] device veth1_vlan left promiscuous mode [ 1173.372932] device veth0_vlan left promiscuous mode [ 1175.997564] Bluetooth: hci2: command 0x0409 tx timeout [ 1177.381722] device hsr_slave_1 left promiscuous mode [ 1177.390904] device hsr_slave_0 left promiscuous mode [ 1177.403300] team0 (unregistering): Port device team_slave_1 removed [ 1177.415562] team0 (unregistering): Port device team_slave_0 removed [ 1177.424931] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1177.436371] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1177.465229] bond0 (unregistering): Released all slaves [ 1177.481317] IPVS: ftp: loaded support on port[0] = 21 [ 1177.600639] chnl_net:caif_netlink_parms(): no params data found [ 1177.696113] bridge0: port 1(bridge_slave_0) entered blocking state [ 1177.703248] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.715265] device bridge_slave_0 entered promiscuous mode [ 1177.723156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1177.733594] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.741658] device bridge_slave_1 entered promiscuous mode [ 1177.773827] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1177.783678] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1177.815023] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1177.823154] team0: Port device team_slave_0 added [ 1177.832833] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1177.841363] team0: Port device team_slave_1 added [ 1177.870959] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1177.877568] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1177.906554] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1177.922345] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1177.929135] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1177.958095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1177.973114] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1177.982018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1178.015087] device hsr_slave_0 entered promiscuous mode [ 1178.022460] device hsr_slave_1 entered promiscuous mode [ 1178.031844] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1178.040284] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1178.077236] Bluetooth: hci2: command 0x041b tx timeout [ 1178.159959] ieee802154 phy0 wpan0: encryption failed: -22 [ 1178.165681] ieee802154 phy1 wpan1: encryption failed: -22 [ 1178.182424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1178.188815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1178.195465] bridge0: port 1(bridge_slave_0) entered blocking state [ 1178.201858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1178.255047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1178.269418] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1178.283779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1178.291674] bridge0: port 1(bridge_slave_0) entered disabled state [ 1178.300668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1178.312208] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1178.318800] 8021q: adding VLAN 0 to HW filter on device team0 [ 1178.329275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1178.336963] bridge0: port 1(bridge_slave_0) entered blocking state [ 1178.343363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1178.369426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1178.377746] bridge0: port 2(bridge_slave_1) entered blocking state [ 1178.384120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1178.393255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1178.402068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1178.416689] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1178.427028] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1178.438120] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1178.444997] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1178.453079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1178.461285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1178.476830] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1178.484550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1178.493492] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1178.502055] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1178.510634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1178.523152] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1178.543269] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1178.553560] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1178.562482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1178.571365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1178.599929] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1178.608915] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1178.615711] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1178.625234] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1178.632725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1178.640741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1178.649643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1178.656634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1178.665743] device veth0_vlan entered promiscuous mode [ 1178.674832] device veth1_vlan entered promiscuous mode [ 1178.682795] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1178.691691] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1178.704675] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1178.714387] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1178.721646] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1178.729219] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1178.736545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1178.744445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1178.753889] device veth0_macvtap entered promiscuous mode [ 1178.761275] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1178.770787] device veth1_macvtap entered promiscuous mode [ 1178.776859] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1178.785909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1178.795647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1178.805684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1178.815488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.824967] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1178.834733] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.844836] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1178.852422] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1178.859291] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1178.866560] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1178.874292] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1178.882497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1178.892663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1178.902718] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.912159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1178.922129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1178.932572] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1178.939693] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1178.946350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1178.954418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1179.084624] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1179.091642] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1179.102481] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1179.123317] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1179.135294] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1179.142973] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1179.152197] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1179.160776] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1181.146363] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1181.153246] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1181.162941] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1181.170040] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1181.178563] device bridge_slave_1 left promiscuous mode [ 1181.184018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.192013] device bridge_slave_0 left promiscuous mode [ 1181.199505] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.209214] device veth1_macvtap left promiscuous mode [ 1181.214547] device veth0_macvtap left promiscuous mode [ 1181.220926] device veth1_vlan left promiscuous mode [ 1181.225968] device veth0_vlan left promiscuous mode [ 1184.156565] Bluetooth: hci2: command 0x0409 tx timeout [ 1185.209877] device hsr_slave_1 left promiscuous mode [ 1185.217952] device hsr_slave_0 left promiscuous mode [ 1185.233637] team0 (unregistering): Port device team_slave_1 removed [ 1185.242934] team0 (unregistering): Port device team_slave_0 removed [ 1185.253057] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1185.267034] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1185.297304] bond0 (unregistering): Released all slaves [ 1185.311762] IPVS: ftp: loaded support on port[0] = 21 [ 1185.401908] chnl_net:caif_netlink_parms(): no params data found [ 1185.485292] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.494642] bridge0: port 1(bridge_slave_0) entered disabled state [ 1185.504577] device bridge_slave_0 entered promiscuous mode [ 1185.515155] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.523542] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.535357] device bridge_slave_1 entered promiscuous mode [ 1185.565010] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1185.578576] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1185.605366] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1185.617230] team0: Port device team_slave_0 added [ 1185.623042] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1185.633060] team0: Port device team_slave_1 added [ 1185.658728] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1185.665006] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1185.694948] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1185.716698] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1185.722952] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1185.752079] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1185.763389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1185.775116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1185.803995] device hsr_slave_0 entered promiscuous mode [ 1185.813456] device hsr_slave_1 entered promiscuous mode [ 1185.820384] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1185.831430] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1185.945352] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.951753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.958544] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.964923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1186.021592] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1186.034157] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1186.045054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1186.057632] bridge0: port 1(bridge_slave_0) entered disabled state [ 1186.064448] bridge0: port 2(bridge_slave_1) entered disabled state [ 1186.081858] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1186.092093] 8021q: adding VLAN 0 to HW filter on device team0 [ 1186.103249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1186.113442] bridge0: port 1(bridge_slave_0) entered blocking state [ 1186.119989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1186.133477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1186.141537] bridge0: port 2(bridge_slave_1) entered blocking state [ 1186.147959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1186.173391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1186.182469] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1186.198250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1186.206073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1186.218494] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1186.230192] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1186.236657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1186.240413] Bluetooth: hci2: command 0x041b tx timeout [ 1186.244049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1186.264197] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1186.273578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1186.280798] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1186.294879] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1186.312754] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1186.324220] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1186.331975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1186.340521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1186.394027] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1186.402350] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1186.409794] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1186.420369] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1186.427149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1186.434672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1186.443687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1186.451035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1186.460796] device veth0_vlan entered promiscuous mode [ 1186.470925] device veth1_vlan entered promiscuous mode [ 1186.477161] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1186.485530] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1186.499632] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1186.508782] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1186.515619] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1186.523193] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1186.530741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1186.538532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1186.549125] device veth0_macvtap entered promiscuous mode [ 1186.555269] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1186.564514] device veth1_macvtap entered promiscuous mode [ 1186.571493] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1186.581771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1186.591836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1186.601043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1186.611350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.620912] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1186.631112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.641559] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1186.649476] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1186.656467] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1186.663690] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1186.671611] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1186.679746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1186.690816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1186.700968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.710736] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1186.720702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.730907] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1186.737916] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1186.744893] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1186.752928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1186.858340] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1186.864792] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1186.881027] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1186.889859] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1186.896058] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1186.904913] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1186.912472] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1186.919589] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1188.874138] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1188.883957] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1188.894253] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1188.901606] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1188.909784] device bridge_slave_1 left promiscuous mode [ 1188.915222] bridge0: port 2(bridge_slave_1) entered disabled state [ 1188.922824] device bridge_slave_0 left promiscuous mode [ 1188.928745] bridge0: port 1(bridge_slave_0) entered disabled state [ 1188.938999] device veth1_macvtap left promiscuous mode [ 1188.944417] device veth0_macvtap left promiscuous mode [ 1188.949845] device veth1_vlan left promiscuous mode [ 1188.954877] device veth0_vlan left promiscuous mode [ 1191.915783] Bluetooth: hci2: command 0x0409 tx timeout [ 1192.907207] device hsr_slave_1 left promiscuous mode [ 1192.914416] device hsr_slave_0 left promiscuous mode [ 1192.927335] team0 (unregistering): Port device team_slave_1 removed [ 1192.942618] team0 (unregistering): Port device team_slave_0 removed [ 1192.951610] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1192.965691] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1192.993166] bond0 (unregistering): Released all slaves [ 1193.009534] IPVS: ftp: loaded support on port[0] = 21 [ 1193.101889] chnl_net:caif_netlink_parms(): no params data found [ 1193.189959] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.199978] bridge0: port 1(bridge_slave_0) entered disabled state [ 1193.208543] device bridge_slave_0 entered promiscuous mode [ 1193.219495] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.226342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1193.233878] device bridge_slave_1 entered promiscuous mode [ 1193.264841] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1193.274882] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1193.304178] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1193.313108] team0: Port device team_slave_0 added [ 1193.322088] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1193.330907] team0: Port device team_slave_1 added [ 1193.360742] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1193.368416] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1193.397388] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1193.410593] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1193.419534] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1193.449832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1193.461252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1193.472577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1193.502824] device hsr_slave_0 entered promiscuous mode [ 1193.512166] device hsr_slave_1 entered promiscuous mode [ 1193.525959] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1193.536751] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1193.644223] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.650726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.657453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.663869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1193.721436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1193.734798] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1193.744878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1193.756959] bridge0: port 1(bridge_slave_0) entered disabled state [ 1193.763722] bridge0: port 2(bridge_slave_1) entered disabled state [ 1193.779670] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1193.789958] 8021q: adding VLAN 0 to HW filter on device team0 [ 1193.800631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1193.809207] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.815610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1193.830331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1193.838223] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.844594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.862471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1193.879878] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1193.887989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1193.899284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1193.911884] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1193.926876] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1193.932920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1193.944265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1193.964039] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1193.973427] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1193.986517] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1193.995892] Bluetooth: hci2: command 0x041b tx timeout [ 1194.006560] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1194.023677] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1194.034329] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1194.041633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1194.052133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1194.095930] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1194.103010] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1194.110232] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1194.121504] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1194.128800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1194.136824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1194.145039] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1194.152152] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1194.160107] device veth0_vlan entered promiscuous mode [ 1194.172374] device veth1_vlan entered promiscuous mode [ 1194.178606] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1194.188595] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1194.199960] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1194.209411] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1194.216660] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1194.223835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1194.231193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1194.239281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1194.250216] device veth0_macvtap entered promiscuous mode [ 1194.256855] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1194.275006] device veth1_macvtap entered promiscuous mode [ 1194.281363] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1194.292019] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1194.302209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1194.311119] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1194.321301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1194.330791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1194.340565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1194.350684] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1194.358563] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1194.365612] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1194.372828] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1194.380343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1194.388574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1194.399210] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1194.409455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1194.418678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1194.429286] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1194.439576] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1194.446677] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1194.453341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1194.461401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1194.571688] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1194.578561] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1194.593829] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1194.599816] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1194.607526] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1194.607958] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1194.614627] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1194.629176] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 2021/07/09 08:54:45 executor 4 failed 11 times: executor 4: exit status 67 SYZFAIL: mmap of output file failed (errno 22: Invalid argument) SYZFAIL: child failed (errno 0: Success) loop exited with status 67