b040a83aa1d72150f5ceeaea5bf26eaebd3b451f4e4a9b345ab92d3c6589a6b0ebde4e9732ab59dc48c1ebe95a0214f39e073553feb2bfbb3ed7af253cdbfce5a098842f843805d690797ab952cd9db52491b3122aab4d705c8aabee0efb8aafabdcc2eb4936df54fa62510bcff9d5b99def8b692dbf169105c8c01a37155a1ec37efb0b90b758b4d8b4dc2a40fa9acba2ac0e6397fd9edf1fc535bab7ae3b17503314bdf67415ee17dc3a8046ce2b70cac1ed4e948be279728bf9132bee4f48a86fa5304977252c9bac0f03cc538a29e885194e39ba11a2ae112e117d0352b93eef549d690e17aca6872bfb8eee06d6addb20b5018c2389c1b76cd9d8e1a81c4182e4f3d630b4cb7686e72952dadb77d5b5a3ca767abd6c9e9525d9ea607e52588bb86d74807c31f224939cccb63ec199a45d1d4a6ac5b0069f7b9166a9334c9ea8f14591ec0a365c96a4dd19192ce4d6a1d352af462ef877a7317709daa63f81eaeb55baf77886a4a1c76e5c6564b422ae900957000720d7b9fefd1183d53e621d5b982ebbc57653763ce3294a59c0ca5a07bda5822760325ab4283bdae3250c9063d7742d3eeac463f1c4536dad2521ebdaafe4276c8153d211f9dabc793066093eb56ab93407ea7731037cf6cb4acae6d4c9b1a3d9c75ebcdced3d1a22d20fac114fe2484a6ad32d1a8496dff9551b0195a307de1162bfc594de51def4c35ddda6d633529243902c8ffed311628fb59bf40c0cbff131e85be835db249c4c8d1450afc2e89658a150a1b8143dba5bc8a429dfa8d9a1c1546427d85133e0cb8b9bc6133fa4c0ddcbfbad79e33a21941fb532bee308955d7b8709500cbd63dd257fdb752ad09724c762928c6a7788647ac60a3a9f562cd23fd1dd2df702164f937146c2b5b0dd50e1c2a358ff2576744697715a4aee76044e039c78bf252ff9584f8a8cf6ab58b7d9ad1306f5d98f07b6bfa38e83c19d9a74705100c0de1c5802e3d623e6c47c67e4a5dee1f2af761720f2726c74804a3acfab916919d6158fc8c6f164810957b17c3ae61de8d8e6c57f1d0fa94c8128692f08e8d132d1f749892fbf8c181ccd293ef945dbad7d4fbf854b2c3b6115cb04ce8a3fbaec225a0aff5bcb3e8431eb8cdef85fb488654d85d1a6628a69d48b4469d0611fbb67f6f94a1d4192eebf8647497f5fb6c657098ea6ac51c7a0622d829437d5855b8b57621603a908ee97d30ce462b15b2ae8353993c84951efe73d35baed3c7dede8cae1ef33347eba1c881ff7d26eaae336c4b0f4f08e902c7a61e4ef5d5409023371151c37dd02475524d39af2e0b592ec0a069a2ca239d224a3d05f0b241ce09b1911f2a2145e86fb48413b3cdead6624933f0792ed2e23ede45320e2a2ef65c7eed8357b8aa12839f79eb00c8ebbb37296e0e9d08397e6a86a8a0c306322f7cbfdf255e2f584d68a6cedcc21cd3c3fe0f7183563dea3b3849e20fb50f21f9827adb5c8c30096f4961db67cff8ebcb1b86d24f1d3257de25df94948bbe69dcfaa385c31e3f645d2b43e5e728454f7ffb5bc11fbdfc14970ff22450cdd5eb194bb1b676c4c82841932a6beae2436a897be1b0cfe0b10b5c7e0c8bc67cc978c7fc734c34ee4770c3a863fdf865ba550baa74392851813dd575bdedc831eaac0ddc4014f4cba04ce34ec582cdf9dd6374323c790cb4ff6c00bdcb39f5ba343ec73f6c92f8576a1cc096a496b32f1978e94690094d8fcdcb4b4b2ce88131969d6b07d7426b04d54a3de013dc516c43ba214dc3c346fa6d6d58f9e3e45a14c854de0e26cef2f745c79423f6044371f3758fc87d3b4b1f87178457325e15d1e228d1a5b38f9fc0b87c56830eb83c5d932e5cf0e3fcda73b3074173fd0ed610e68a792c64736eae337a686390f75842fd8ce75b56fb77a418c42c7fb1e6e675a5687c9f6ff4641ba6cd9653d28613f51b90c2ee37aa0b29888e499e5377449eedf22cbf1c91a67ca4994e7b26ca7b5c7811ff2cd4c0569b16ee1e0c5cba9afe77b61b8b1a18db0c6ab019ddea3275ce3d57118e752a8fb9d81a431626fed64b42332c29a86de947457e457dfe897020cfe6dd5a8305df7cfc891b447a003586e6e84775e4bf0c70d7a96d03cd1c55b81c34c0c742d68173fdd811e3fe52d226ace3dd686f1586b4da91d2bb472d8388102173aebe8071bd2ae2f9de60fbf4f5c3c17f41598c556c656f7738db5601d3ccb88b2ad9b3f8cea3aabb24c830c6568c897acbde6744932dd58ae0edd80f9efc91b1a29a631066d7a1e4ff1c41ba6e851d09a73a8c49a6fc562cd34e8eb8f34969567c00e34a91f5e205e045e24b132715134dc994364b32f7c7ab79bb374d7aa90db3816baee8c472cf2e0fcb5629c6451ca2a297ee85ff641951f243d2d04df7a1675c39c6d71101c01bf23af05bb95692d334ebef57e219bd7d7211e129a5dbaf1dda784e9a52a1fc5209b506499997e34096b7e416fdb0317f326265ffdbf282cbaf1d009daead2f2af1955e40642a1110ec379231c0e126e766cc5caf9a112609e17bda8610db4fade54cd7c7b6e750e041b6d7ebc9fb899e65142b0e6ebd081f4", @typed={0x8, 0x63, @uid=r8}, @typed={0x14, 0x3c, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, @typed={0x8, 0x3c, @u32=0xb2}]}, @generic="af35fc3bdd404d576d275abd0be70bd6f2154609b1c1b1f1a0ba0a4030e5c6504a8723fde417415f73a9417f952746bb4aa4fcc1dc7f3d56236e009d2533cd66015581e43b6ad9063ae2a4c075a2be3cb48d8b97838ca87015bb0457d9", @nested={0x168, 0x75, [@typed={0x14, 0x55, @ipv6=@rand_addr="28acbaf80f4e333911d232c75117e5b9"}, @typed={0x8, 0x8e, @pid=r9}, @typed={0x30, 0x49, @str='md5sumvboxnet1(..ppp0vmnet1&!*locpusetuser\x00'}, @generic="7e3bc94b477b07714a3ed31ef0338fec8c6a62ab58911e34049fdde16465415da3c43d332169c58d01cf957795e78e34a8549284a26d6f845977f43563ef327e2013025b998b533282d53a745f8ce046f57adb9712d356ed8cc67bc3ff46e8f3735cedd65599cb9dec8af89a67fd54746e", @generic="bf2a1cfb69350b054cafff7c1386d76ff2259f1dc02e18f4697e4a6424b5f9a97ab74ed295720ffca0e6eb39b486fadd721cc2c042b7829861c275e69c955f2cf1cfe72aed7b3684b676fff83526f1e7dbed20cadaed5475ed9d6ab413a7d0dd46d444db32ce23a48ed722ab3e3940981796fb766ad7a91d42546c65515b1f0b852f", @typed={0x18, 0x47, @str='posix_acl_access\x00'}, @typed={0x8, 0x53, @pid=r10}, @typed={0x4, 0x9}]}, @typed={0x1004, 0x15, @binary="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"}]}, 0x3594}, {&(0x7f0000009840)={0x1c8, 0x3b, 0x0, 0x70bd2a, 0x25dfdbfb, "", [@typed={0x8, 0x83, @uid=r11}, @generic="4bcd79fd7025f5e06c6486a9dffad1e19926ded558406f1d7fe2715c01c8c5c2d808a1f84c481f6fab420fb733b77f3724849005707e4e438cd5431559432d4013d481b9dd4021ef28623f0ad961974b4d7d8d9721c625ce020b55f9df30dae5588dda48a68105e9b7229124530618", @generic="7271f796676a75609162ec02337ba653c483ef1edbb042be02404520e19aea862c788ed99e1848b85d912b6db5d473a87f9c6da9b5f2bb81ea939b6ca1708596f7c498795035e26f516cee96a53618c21511c7fbcdab84933d0a55a18a68abd2ffb2d7a7b3cba6654274d2a8fa616341", @typed={0x8, 0x68, @ipv4=@rand_addr=0x800}, @generic="0b56de6b4e56be107680a3c6bf96e6499a250a63e3fecd6b8ba78b73ae1151a7fcda5e3bb40a6b43362937cc74801faf191041c14de864118661048eb195334618f83f2732909bfb50ece08e5397acd7a7a6e23a73a0c30a5b87f143d93ab80da70a2570a316cea5fe13fbfc48cb063bca13bc98be8d8d056c06baf60da3843ff55b2ca8d48c863b6aa6580de48d2714a33053e59ea2af75a63b64a5403f7f73876e001080ff450bb7e59b7956917bad0fd3b8b9d3a662e5d72d5ce8caf94336c9277826a8f9a9"]}, 0x1c8}], 0x5, &(0x7f000000a1c0)=[@cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}, @rights={{0x30, 0x1, 0x1, [r1, r0, r0, r0, r0, r1, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r15, r16, r17}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r18, r19, r20}}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, r23}}}], 0xc8, 0x41}, 0x4000) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000200)={@empty, 0x31, r3}) r24 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r24, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r24, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r24, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:21 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) clone(0x800002502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) 03:12:21 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x8000, 0x0) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x800, 0xc2) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000200)={0x10001, 0x0, 0x1, r5}) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/156, 0xffffffab}, {&(0x7f0000000300)=""/231}, {&(0x7f0000000400)=""/164}, {&(0x7f00000004c0)=""/203}, {&(0x7f0000000180)=""/25}], 0x1e8, 0xffbffffffffffffe) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000080)=""/79) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e22, @rand_addr=0xfff}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e22, 0x874, @rand_addr="5ba1486671c8c95f695973afc07e9eea", 0x8}], 0x3c) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) [ 466.054350] device bridge_slave_1 left promiscuous mode [ 466.078278] bridge0: port 2(bridge_slave_1) entered disabled state 03:12:22 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x800, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x1, @null, @netrom={'nr', 0x0}, 0x4, 'syz0\x00', @default, 0x93, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r4, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000240)={0x0, 'syz1\x00'}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, 0x0) read(r4, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 466.212924] device bridge_slave_0 left promiscuous mode [ 466.229132] bridge0: port 1(bridge_slave_0) entered disabled state 03:12:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000fec000/0x3000)=nil, &(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000fef000/0x4000)=nil, &(0x7f0000ff6000/0x3000)=nil, 0x4000, 0xee54e5c0552ad7f0}) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r1, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x24040804}, 0x46f8195b5bc02ce4) stat(0x0, 0x0) [ 466.319573] Unknown ioctl 35084 [ 466.390838] Unknown ioctl -2145892025 [ 466.494498] Unknown ioctl 35084 [ 466.520782] Unknown ioctl -2145892025 03:12:22 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) accept$inet(r4, &(0x7f0000000180)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000400), 0x6, 0x0) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)="e59461034201e188f367ab8d59b4dcdf5cf430985e27dedbaa55a7e84c7d43cdf71b0d2fb88ea4a3ef5acb6ea4130659e4736c909326b30b758eb13550b3049f0d650c9ec9bf03f491fcb54f050f3d4b4510a801aaa4357b2a465437e5dc6c3f5271809e62a534ddb74f27baa77c0190d6fc29645fa7984dfd24682cb8bb338fec60c2e7d35cee9b10a0774a1455604a6fbaf4aaaaa128e4249cfa06c7c059891ca571a9aa0f0c223818f6f975501d92cb1a9e5ca06fdcf67cc4e476bdf1f40a29cd2f0fc133aa954c4d80", 0xcb}, {&(0x7f0000000000)="fe1cd791613df773c45a6b970afaab8a7c3dad5b7e6a74db", 0x18}, {&(0x7f0000000240)="80ec0534863890a331d4151a3781ee3bc583b0a0406edfcb4b1d53287897cc27a24b7fe04f07a6e99c515685a17f03b4d5550ecf075d58b436f0b6e0b8f733f1af00ee8cae98a7ab4cf8125a30d72b56ef748bbf1d1ea949e17b301f989de1f830570dd6981a7568d6c476f73c6ec37230e71a77b40967d90ab57b5427c3f19b60cf828ea49f3d6d8b2f49038033f0d534aafe2878009d7396e4d10004b1f518d3be8175714c24d7339ec7e0a891f9c95e0c1b5337bc824e1aba771171ac1cbe119c548587c41ca098c657e69d", 0xcd}, {&(0x7f0000000340)="389cf45f8d8507adda1e5e987d9d4549121908db584f637bd18f650caa37501a36551bad95907437327fe919fee60816e3dbccd3b24660d4b7a57c442f9ad1bc38174d3513bfd1723276810dce66eb0326612635e613f12e588fc4634d4f04332d7ab7dca133c371ae73d208e1035d6b02be3cde14287857913640c5f04d08064aefcff14a32f76fcebb625a6abdf4e91eb14b8c028fa80c4d128a84fbe748f2fe77168c2863ff0acada0678d9c5622a1ebd40cf5394665b0aa313a333026e4742491c", 0xc3}, {&(0x7f0000000180)="96587bbae7d8a824234aa0a24f122fd1e511df2677f8b30f2784ca080e347a115a89e4d16887e39c23f67fae122b90820192f71c641b47edd66313498231f2c7178d203629fd1b7a5b46ebf24470601d5b03d63e7d0531ca9b69b13fd2c40ee83bc43eb962c2fb4547f192806a700de0ff2e", 0x72}], 0x5, &(0x7f00000004c0)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7fffffff}, @iv={0x18}], 0x48, 0x4}], 0x1, 0x0) [ 466.724852] device hsr_slave_1 left promiscuous mode [ 466.777824] device hsr_slave_0 left promiscuous mode [ 466.846367] team0 (unregistering): Port device team_slave_1 removed [ 466.925475] team0 (unregistering): Port device team_slave_0 removed [ 467.020845] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 467.098433] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 467.311598] bond0 (unregistering): Released all slaves [ 468.725966] audit: type=1400 audit(1565665944.581:99): avc: denied { map } for pid=18474 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=24 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 469.271427] IPVS: ftp: loaded support on port[0] = 21 [ 470.134473] chnl_net:caif_netlink_parms(): no params data found [ 470.169326] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.175794] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.182682] device bridge_slave_0 entered promiscuous mode [ 470.189187] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.195825] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.202784] device bridge_slave_1 entered promiscuous mode [ 470.220376] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 470.229032] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 470.247362] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 470.254743] team0: Port device team_slave_0 added [ 470.260183] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 470.267243] team0: Port device team_slave_1 added [ 470.272946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 470.280168] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 470.362120] device hsr_slave_0 entered promiscuous mode [ 470.400388] device hsr_slave_1 entered promiscuous mode [ 470.460498] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 470.468185] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 470.481033] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.487371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.494057] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.500419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.527841] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 470.534318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 470.543225] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 470.552025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 470.559086] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.565820] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.576112] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 470.582287] 8021q: adding VLAN 0 to HW filter on device team0 [ 470.590653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 470.598226] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.604607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.621169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 470.628710] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.635095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.642695] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 470.650401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 470.658335] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 470.670601] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 470.681429] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 470.693608] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 470.699905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 470.707578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 470.715143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 470.726585] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 470.737362] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 471.120502] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:12:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000001340)="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", 0x209, 0x0, 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac668ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) sendmmsg$inet_sctp(r0, &(0x7f0000002cc0)=[{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000001780)="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", 0x115}], 0x1}], 0x1, 0x0) 03:12:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd1e, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x13, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, r0, 0x0, 0xc, &(0x7f0000000640)='\xa3-vboxnet1)\x00', 0xffffffffffffffff}, 0x30) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) r2 = syz_open_procfs(r1, &(0x7f0000000540)='net/sockstat6\x00') ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000040)=""/206, 0xce}, {&(0x7f0000000240)=""/251, 0xffffffffffffff65}, {&(0x7f0000000340)=""/243, 0xf3}], 0x3, 0x0) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:27 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = gettid() fcntl$lock(r0, 0x24, &(0x7f0000000280)={0x1, 0x3, 0x6cb, 0x200, r2}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) r5 = syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000340)={r6, 0x2}) ioctl$VIDIOC_S_MODULATOR(r5, 0x40445637, &(0x7f00000001c0)={0x4, "e5bccf7588a405308f308f40763f54dac61270b60f17f27dd993b2789235dba6", 0x20, 0x2, 0x7fff, 0x4, 0x116857d76875d1ab}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r4, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000480)=""/240) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r7, 0xc0044308, &(0x7f0000000580)=0xfffffffffffffffa) ioctl$DRM_IOCTL_AGP_RELEASE(r7, 0x6431) read(r4, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/230, 0xe6}], 0x1, 0x4) 03:12:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000001340)="13f02be2813337c50e0eb87301dc51d936f4372d68b2af369888ccb2042cd7526696d11b30a88f0efdd04adf8bd0b8ceb190c80de1bc15d8b98bbb975c325cce9e0f6106f5bd91f2664e92f63605f27b3be6840362e3877b514a5c063b40a6c6081e6d32324ecec66fb652a7398fc9941687d23f57c2c9fb0338edf9e88fae3adc94870da8d9002c744ca8278d37b1731ab5a3d9ad015b29bcb54a0bae4224e95da89688a378242b5bc2ae9a469728c48d578248e876a2f3a3b2cb4edf7e4281e0dc8ab80fb0925d2ef5d17624c40c4a116b6fa4effd65a7defe59ee0cb8b223bd6138ad584ed9bfc7b92c35b64cebae2dcea616ab8a2be2c1e3e49a747cd1c6cd118bf1c812caf0d94da9064d097331f1468035dcc7219fe594aabfecf206fa2da9de7dc14d5205b345d1ec9c71c3fda929f5ea4a2b3b1cebf23828118695c075b487c8b43c64eab100a22fd6bdbe256f027e51da903871bac351fcd6a96aa1a015f9ebb59628ebfc7065feacf8102c6eb0ce251c7c3cfab33b547b7a336dc898056920641d582d437f8bfe713064f5fd32e99928892a38248913ec89dd165867f935a7a76db95609a2d6f5a53c7517ae62c5a635e1d7ac02156c99ae80563640a5e82dcac540a2f48543767b5b8544594cf2bfa5461a93321d352c90a578a989ad0c5d185a67346fb720d593384b381872aea771d529c5898a6aebb9bba2430c90ab2981", 0x205, 0x0, 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup3(r1, r0, 0x80000) 03:12:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000000)) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x15) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:27 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r4, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r4, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$rds(0x15, 0x5, 0x0) getgroups(0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:28 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x21d, 0xffb6) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f0000000100)='\'', 0x20000101, 0xc0, 0x0, 0x0) 03:12:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, 0x0) 03:12:28 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x880, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2b, &(0x7f0000000480)={0x2, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e20, @empty}}}, 0x108) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xfe08) prctl$PR_SVE_SET_VL(0x32, 0x3e67e) readv(r4, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r4, &(0x7f0000000380)=""/225, 0xfffffd0d) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="fe6fa1555c9b2de26b489031e0fc3d1162a8cef5cb6c4b0fbd62c8008868728283c204c327d3", 0x26) 03:12:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='.\"&6N\xc06\x8a\r\xc2\xb3f\xc3\x96a\xf2h\xd6\xfb2\xf6\x9abg\x8b\x8f\x00\xfd\xca\x17\xf17~^*\xa3\x87uX_)\x97\xbf5\x9b\xb5\x86_\xa2R\xaa\xc7\xb0\x85p?vP\x91T\x11@;\xb0_~\"\x1a\xfeGGJ7{c;t\xcd') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000000)={0x0, 0x2, 0x1}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000100)=""/109) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) write$selinux_attr(r1, &(0x7f0000000040)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c) sync_file_range(r0, 0xfffffffffffffffd, 0x9, 0x7) 03:12:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$rds(0x15, 0x5, 0x0) getgroups(0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, 0x0) 03:12:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000001a00)=@routing={0x0, 0x4, 0x2, 0x0, 0x0, [@loopback, @local]}, 0x28) 03:12:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="1800000000000000000000000000000007110800000000009500000000000000ec9ac6fa8d25294013684a23600edaec56cbd4baf295d8919b5d3fe4112348e709735a6b69f9e9ef9565c85cadf4b404182858792747b0b2394d41197b4c14bcc3f0cb912da94f2871a249de472a1977645440441eddd29f30ec22634dc8ee52261c74dd5c646964213b90b3fe48edb67e96e9e9c0a184227f00526d4059781f7d09356f1ed2c5bd477d43bc08f33ae06b1b6f2a2bb64b0c24af08f482fd9b398c2246c4f9ee73977848c25f5f16898cdcd7b9aa"], &(0x7f0000000100)='\x05\x00\x00\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:12:28 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000280)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '5&h', 0x44, 0x11, 0x0, @local, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}}, 0x0) 03:12:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, 0x0) 03:12:28 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x6, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000240)=r3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000280)={0x3, 0x8}) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000005c0)="fab2a1cc1817c2e320355c56aad266bb41f435bae4372e4ba67f9309a7117947bca8c2efe2", 0x25) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000300)='./file0\x00', r6, r7) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r5, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r5, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x1, 0xf, 0x3}) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000380)="11dca5055e0bcfe47bf070") listen(r0, 0xffffffff80000001) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x2e}, 0x98) 03:12:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:28 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) bind$vsock_stream(r2, 0x0, 0x0) 03:12:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)) 03:12:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 03:12:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)) 03:12:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000001a00)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@loopback]}, 0x18) 03:12:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0xffffffffffffff27, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:29 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0xffffffffffff0000, 0x4, 0x3, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0xe3e1a656c441f91d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8001}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) shmget$private(0x0, 0x1000, 0x540c0c92e06637cb, &(0x7f0000ffc000/0x1000)=nil) stat(0x0, 0x0) 03:12:29 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) bind$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 03:12:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)) 03:12:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:29 executing program 5: 03:12:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:29 executing program 1: 03:12:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000002580)}}], 0x52, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:29 executing program 4: 03:12:29 executing program 5: 03:12:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x9000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000240)='./file0/file0\x00', 0x141042, 0x2) creat(&(0x7f0000000280)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x858, 0x20003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x8, 0x0, 0x2}, 0x5}}, 0x18) r3 = dup(r2) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000003c0)=0x0) dup2(r3, r1) ptrace$setregs(0xd, r4, 0x1ff, &(0x7f00000006c0)="e9c3ef68d673d6e50f8ccd92508d06fd82b12d54d9fb5a6e2e1447c1e90ada4d3dd68c2211bbd105dc6b021de83adeb879fa21d0094580fdb7d36aace812257fbf892baf635effcd69e51c5e1c8f9d8fcf777f02aba7f0ee6760e5603b16b80298704fee9d5cc06d984a") ioctl$FICLONE(r1, 0x40049409, r2) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r3, r5, 0x0, 0x8000fffffffe) 03:12:29 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0xff4e, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 03:12:29 executing program 1: 03:12:29 executing program 5: 03:12:29 executing program 3: 03:12:29 executing program 4: 03:12:29 executing program 3: 03:12:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:30 executing program 1: 03:12:30 executing program 5: 03:12:30 executing program 4: 03:12:30 executing program 3: 03:12:30 executing program 2: 03:12:30 executing program 3: 03:12:30 executing program 1: 03:12:30 executing program 4: 03:12:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440), 0xc) 03:12:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:30 executing program 4: 03:12:30 executing program 1: 03:12:30 executing program 3: 03:12:30 executing program 4: 03:12:30 executing program 3: 03:12:30 executing program 2: 03:12:30 executing program 1: 03:12:30 executing program 5: 03:12:30 executing program 4: 03:12:30 executing program 2: 03:12:30 executing program 3: 03:12:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:31 executing program 5: 03:12:31 executing program 1: 03:12:31 executing program 2: 03:12:31 executing program 4: 03:12:31 executing program 3: 03:12:31 executing program 4: 03:12:31 executing program 1: 03:12:31 executing program 5: 03:12:31 executing program 2: 03:12:31 executing program 3: 03:12:31 executing program 1: 03:12:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:31 executing program 4: 03:12:31 executing program 5: 03:12:31 executing program 2: 03:12:31 executing program 3: 03:12:31 executing program 1: 03:12:31 executing program 4: 03:12:31 executing program 5: 03:12:31 executing program 3: 03:12:31 executing program 2: 03:12:31 executing program 1: 03:12:31 executing program 5: 03:12:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:31 executing program 4: 03:12:31 executing program 1: 03:12:31 executing program 3: 03:12:31 executing program 2: 03:12:31 executing program 5: 03:12:31 executing program 4: 03:12:31 executing program 3: 03:12:31 executing program 1: 03:12:31 executing program 5: 03:12:31 executing program 2: 03:12:31 executing program 3: 03:12:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:32 executing program 4: 03:12:32 executing program 1: 03:12:32 executing program 2: 03:12:32 executing program 5: 03:12:32 executing program 3: 03:12:32 executing program 1: 03:12:32 executing program 2: 03:12:32 executing program 3: 03:12:32 executing program 5: 03:12:32 executing program 4: 03:12:32 executing program 1: 03:12:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:32 executing program 2: 03:12:32 executing program 3: 03:12:32 executing program 5: 03:12:32 executing program 4: 03:12:32 executing program 1: 03:12:32 executing program 5: 03:12:32 executing program 3: 03:12:32 executing program 1: 03:12:32 executing program 5: 03:12:32 executing program 4: 03:12:32 executing program 2: 03:12:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:32 executing program 4: 03:12:32 executing program 2: 03:12:32 executing program 3: 03:12:32 executing program 1: 03:12:32 executing program 5: 03:12:33 executing program 2: 03:12:33 executing program 3: 03:12:33 executing program 1: 03:12:33 executing program 4: 03:12:33 executing program 5: 03:12:33 executing program 1: 03:12:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:33 executing program 2: 03:12:33 executing program 3: 03:12:33 executing program 1: 03:12:33 executing program 4: 03:12:33 executing program 5: 03:12:33 executing program 4: 03:12:33 executing program 1: 03:12:33 executing program 2: 03:12:33 executing program 3: 03:12:33 executing program 5: 03:12:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:33 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:35 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0xffffffffffff0000, 0x4, 0x3, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0xe3e1a656c441f91d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8001}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) shmget$private(0x0, 0x1000, 0x540c0c92e06637cb, &(0x7f0000ffc000/0x1000)=nil) stat(0x0, 0x0) 03:12:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x0, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:35 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0xffffffffffff0000, 0x4, 0x3, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0xe3e1a656c441f91d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8001}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) shmget$private(0x0, 0x1000, 0x540c0c92e06637cb, &(0x7f0000ffc000/0x1000)=nil) stat(0x0, 0x0) 03:12:35 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0xffffffffffff0000, 0x4, 0x3, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0xe3e1a656c441f91d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8001}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) shmget$private(0x0, 0x1000, 0x540c0c92e06637cb, &(0x7f0000ffc000/0x1000)=nil) stat(0x0, 0x0) 03:12:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x0, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:36 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x0, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = gettid() fcntl$lock(r0, 0x24, &(0x7f0000000280)={0x1, 0x3, 0x6cb, 0x200, r2}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) r5 = syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000340)={r6, 0x2}) ioctl$VIDIOC_S_MODULATOR(r5, 0x40445637, &(0x7f00000001c0)={0x4, "e5bccf7588a405308f308f40763f54dac61270b60f17f27dd993b2789235dba6", 0x20, 0x2, 0x7fff, 0x4, 0x116857d76875d1ab}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r4, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000480)=""/240) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r7, 0xc0044308, &(0x7f0000000580)=0xfffffffffffffffa) ioctl$DRM_IOCTL_AGP_RELEASE(r7, 0x6431) read(r4, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x0, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) accept$inet(r4, &(0x7f0000000180)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x0, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:37 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) socketpair(0x2, 0x80000, 0xffff, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$nl_crypto(r4, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x41000400}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=@alg={0xf8, 0x10, 0x100, 0x70bd28, 0x25dfdbfe, {{'stdrng\x00'}, [], [], 0x2000, 0xcc3090b81c90f91e}, [{0x8, 0x1, 0x1}, {0x8, 0x1, 0xf14d}, {0x8, 0x1, 0x7}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x60, 0x1, 0x10001, "5e10cf87f7a84de42016c17fec777f12", "99cfac0370a6b9de150084e85cae92c6042f4c0fe82f897d559d537aceaad0190c3d128c529b96f22eb4d819a10010c32494a96a9826803ec379a141a25dc0e45f3108e9e7010f182a0d35"}, 0x60, 0x1) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x18240, 0x0) ioctl$SCSI_IOCTL_SYNC(r4, 0x4) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0xfd, "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"}, &(0x7f0000000300)=0x105) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000340)={r4, 0x8}, 0x8) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@loopback, @in6=@dev}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1d) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200700, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) shmget$private(0x0, 0x10000, 0x80, &(0x7f0000fed000/0x10000)=nil) stat(0x0, 0x0) 03:12:37 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x1, @rand_addr="37928df4beadc2531dcb66cd9d2b0c3a", 0x1}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, @in6={0xa, 0x4e23, 0x8, @mcast1, 0x15}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e20, 0x7fff, @empty, 0x1f}], 0x74) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, 0x0) read(r3, &(0x7f0000000380)=""/225, 0xfffffd0d) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r5, 0x0, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 03:12:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x0, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x10001, 0x20000) r1 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r2 = mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x20, 0x0, &(0x7f00000001c0)=[@free_buffer={0x40086303, r1}, @acquire={0x40046305, 0x3}, @free_buffer={0x40086303, r2}], 0x0, 0x0, &(0x7f0000000200)}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_int(r4, 0x1, 0x2a, &(0x7f0000000140)=0x4, 0x4) getgroups(0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r6 = accept4$alg(r5, 0x0, 0x0, 0x0) write$binfmt_script(r6, &(0x7f0000000300)=ANY=[], 0xfe08) readv(r6, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/74, 0x4a}], 0x1) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685, 0x0) read(r6, &(0x7f0000000380)=""/225, 0xfffffd0d) 03:12:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x0, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x0, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:39 executing program 1 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) socket$bt_cmtp(0x1f, 0x3, 0x5) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x80000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x0, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$caif_stream(0x25, 0x1, 0x5) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x318a77657cdf62a2, 0x0) write$P9_RSTATFS(r4, &(0x7f0000000140)={0x43, 0x9, 0x1, {0x4, 0x8, 0x0, 0x50, 0x8, 0x7, 0x400, 0x8, 0x4}}, 0x43) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2}) r5 = fcntl$dupfd(r2, 0x0, r0) write$FUSE_NOTIFY_POLL(r5, &(0x7f0000000040)={0x18}, 0x18) 03:12:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:40 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2100000000000003, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000000)='wlan0\x00') 03:12:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000004c0)={'nat\x00'}, &(0x7f0000000540)=0x78) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000240)={0x2, 0xaac, 0x401, 0x4, 0x7ff}) 03:12:40 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3543034571923a2c0e75ecb55217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1ba8116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000280), 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x0, @empty, 0x1}}, 0x6, 0x4, 0x6b69, 0x9, 0x5}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r2, 0xdd4b, 0x1}, &(0x7f0000000300)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000240)={r2, 0x5}, 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r3, 0x8}, &(0x7f00000000c0)=0x8) 03:12:40 executing program 3: r0 = socket$kcm(0xa, 0x6, 0x73) r1 = socket$kcm(0xa, 0x2, 0x73) r2 = dup3(r0, r1, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "e564"}, 0x3, 0x1) sendmmsg$inet6(r2, &(0x7f0000004040)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000002900002bf10ff6591a343176c35281003e00"/36], 0x18}}], 0x1, 0x0) 03:12:40 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200000, 0x0) write$P9_RSTAT(r0, &(0x7f0000000100)={0x4f, 0x7d, 0x2, {0x0, 0x48, 0x5a3, 0x800100000000000, {0xd, 0x0, 0x2}, 0x0, 0x7ff, 0x1, 0x9, 0xa, '/dev/null\x00', 0x5, 'nodev', 0x6, '[%%\'*-'}}, 0x4f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x84100, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000070000000000000000000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000060000000000000000000000080000000000000000000000000000001f0000000000000000000000000000000000000000000000000000000000000009000000ff010000000000000000000307000000000000000001000000000000360500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000026c300"/640]) ioctl(r1, 0x10000000000008, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r3 = socket(0x11, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0xb, &(0x7f0000000000), 0x20a154cc) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000400)) [ 484.746347] audit: type=1400 audit(1565665960.601:100): avc: denied { map } for pid=19081 comm="syz-executor.5" path="/proc/sys/net/ipv4/vs/nat_icmp_send" dev="proc" ino=63424 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file permissive=1 03:12:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000805000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:40 executing program 3: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffff00000001, 0x8b}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000040)={0x9f7f, "971e996940920bbb087f80935caa774417ac6ca13710dbebb912b60e41b2a8b6", 0x5, 0x100, 0x7, 0x7, 0x637f412d35f5f81a, 0x3, 0xfffffffffffffffa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:12:40 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$vsock_dgram(r1, &(0x7f0000000640)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) 03:12:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x0, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) clone(0x41fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup3(r0, r0, 0x80000) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000001140)) ptrace(0x10, r1) ptrace$getregs(0x3, r1, 0x0, &(0x7f0000000140)=""/4096) 03:12:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @remote}, &(0x7f0000000540)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x10000, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000004c0)={0x5, 0xffffffffffffff89}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000000c0), 0x0, 0x84) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="3800000010000d0400"/20, @ANYRES32=0x0, @ANYBLOB="0300000000000000100012000800010394cc341db1015135d631ac72", @ANYRES32=0x0], 0x38}}, 0x0) [ 485.203098] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 485.213711] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:12:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e22, 0x2bf, @rand_addr="9c2cc16b49407b512516d3e0500d1feb", 0xfff}, {0xa, 0x4e24, 0x3, @mcast2, 0x7}, 0x1000, [0x6, 0x6, 0x80000001, 0x100000001, 0xe25e72d, 0xfffffffffffffffb, 0x40, 0xffffffff]}, 0x5c) recvmsg(0xffffffffffffff9c, &(0x7f0000007ec0)={&(0x7f0000007900)=@can={0x1d, 0x0}, 0x80, 0x0}, 0x42) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f00000003c0)=0xe8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000400)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r4}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000580)={0x3, 0x0, [{0x9, 0x0, 0x3}, {0x1000, 0x0, 0x80}, {}]}) ioctl$KVM_NMI(r0, 0xae9a) ioctl$TCFLSH(r2, 0x540b, 0x4) perf_event_open(0x0, 0x0, 0x1, r5, 0x0) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x80a00, 0x0) sendmsg$nl_xfrm(r7, &(0x7f00000004c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f00000005c0)=ANY=[@ANYBLOB="a4020000150002002abd7000fedbdf25fe8000000000000000000000000000aafe8000000000000000c07b145a625c19b22200004e2300000a0020202e000000", @ANYRES32=r1, @ANYRES32=r4, @ANYBLOB="b56b6e00020000000c001c00", @ANYRES32=0x0, @ANYBLOB="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"], 0x2a4}, 0x1, 0x0, 0x0, 0x890}, 0x40080) socket$rxrpc(0x21, 0x2, 0x0) r8 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r8, 0x0, r6, 0x2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={0x0, 0x0, 0x8}, 0x10) 03:12:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)=0xfffffffffffffe58) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000004c0)={0x5, &(0x7f0000000240)=[0x3, 0x8, 0x8, 0x4efa, 0x800]}) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2604}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:41 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x20000, 0x9, 0x6, {0x2, @win={{0x66d4, 0x9, 0xe07a, 0x9}, 0x1, 0x2, &(0x7f0000000180)={{0x0, 0x3f, 0x4, 0x709}, &(0x7f0000000140)={{0xc00, 0x3, 0x0, 0x5}, &(0x7f0000000100)={{0x6, 0x1, 0x0, 0x7d}}}}, 0x5, &(0x7f00000001c0)="7f1931899c6807a93272c58c40f0ee457a9d0002aa29e2ad5c05deedca93e4be31382b400ce909ec130b262708a1b83d", 0xb2}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xa02, 0x0) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000340)={0x2, @vbi={0x1aba5362}}) 03:12:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000140)={0x7, 0x4}) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) personality(0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$sock_SIOCETHTOOL(r4, 0x8931, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = dup2(r0, r4) dup3(r5, r1, 0x0) 03:12:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x0, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000140)="11dca5055e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000180)={0x77359400}, 0x0, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) 03:12:41 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0}, &(0x7f0000000180)=0x14, 0x80800) connect$packet(r0, &(0x7f0000000200)={0x11, 0xf7, r1, 0x1, 0x4, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r2, &(0x7f00000001c0)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000300)="32cd0ae775d5", 0x6}], 0x1}, 0x0) 03:12:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) connect$vsock_dgram(r1, &(0x7f0000000240)={0x28, 0x0, 0x2711, @host}, 0x10) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000004c0)) 03:12:42 executing program 5: syz_read_part_table(0x0, 0x2af, &(0x7f0000000240)=[{&(0x7f0000000040)="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", 0x554}]) 03:12:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r3 = shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:42 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000100)={0x0, @sliced={0x0, [0x2]}}) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000000)={0xffffffff00000001, "3b007c14d3c051937f402e15e812a816bbac09ba9bdb19b3e2a9f53063f64944", 0x200, 0x0, 0x1f, 0x2, 0x1}) ioctl$VIDIOC_ENUM_FMT(r0, 0xc058565d, &(0x7f00000000c0)={0x0, 0x9, 0x0, "c9fcbf485b3519b1279d60579bf46a245fa22b3a42a994d7d8c3552b8dfff595"}) 03:12:42 executing program 1: perf_event_open(&(0x7f0000000000)={0xbf311c3fb31e8b0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000002780)=0xfffffe55) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eb000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035d6ee65891d3718d7c78c6c9a86b1c472ef7d17c378bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f88c2538a628c782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38"], 0x1e7) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000015c0)={0x0, @aes256}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) pipe2(&(0x7f00000016c0)={0xffffffffffffffff}, 0x800) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) syz_open_dev$vivid(&(0x7f0000000280)='/dev/video#\x00', 0x2, 0x2) r5 = openat$cgroup_ro(r3, &(0x7f0000001700)='memory.stat\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x29, 0x1, @thr={&(0x7f00000004c0)="05b3a1ad40a9806e0d5ed910b9d3267924f21e430d1a9d8b1f533715fa8824930d623f07a0b104fc5e332b442a0ef975e28920d5fb7948893a7f39f112372682597fc9d85b61f36af21970e809a78425b2aafea53f69a9df", &(0x7f0000000540)="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"}}, &(0x7f0000001540)=0x0) timer_delete(r6) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x3, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000001600)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={'rose', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x7fff, 0x1, [@default, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @default, @null]}) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000080)={0x0, 0x4004403}) getsockopt$inet_dccp_buf(r5, 0x21, 0xf, &(0x7f0000001740)=""/4096, &(0x7f0000002740)=0x1000) umount2(&(0x7f00000027c0)='./file0\x00', 0x8) accept4$nfc_llcp(r2, 0x0, &(0x7f0000001680), 0x0) [ 486.351615] Dev loop5: unable to read RDB block 2 [ 486.356610] loop5: unable to read partition table [ 486.389632] loop5: partition table beyond EOD, truncated [ 486.422335] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:12:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:42 executing program 3: setpriority(0x1, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x84000) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {}]}) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000000c0)={0x29, 0x42a, 0x5, 0xa, 0x4}) 03:12:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1e7) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, r1, 0x20, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x6}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4800) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 486.541755] Dev loop5: unable to read RDB block 2 [ 486.546806] loop5: unable to read partition table 03:12:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000001c0)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r0, 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x2f6, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x9ac) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 486.583058] loop5: partition table beyond EOD, truncated [ 486.598348] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:12:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x0, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:42 executing program 2: syz_read_part_table(0x5d7, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="808533986af8915fe7743c91840c9780f3f4e07226d6075c7637f4e78dfb54e4b49ff1654454df246d6f2837695d878b1e60957c589c2883bc5276959325fca16ef58a88bb2aa5cb11d89909166ade97cecf1b61ee52475409", 0x59, 0x8}]) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x2d6}, 0x1) 03:12:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000004c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x118, 0xaf06, 0x3ff, 0x8, 0x8000, 0x80000000001, "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"}, 0x230) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000240)={0x1000, 0x8000}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:42 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x410800, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@bcast, @bcast, 0x8, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000300)={0x30}, 0x30) 03:12:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x0, 0x0) bind$x25(r0, &(0x7f0000000140)={0x9, @remote={[], 0x0}}, 0x12) r1 = socket(0x40000000000010, 0x802, 0x0) write(r1, &(0x7f0000000000)="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", 0xfc) 03:12:42 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) close(0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x84000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000440)=0x5) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x4a0100, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) mount$9p_virtio(&(0x7f0000000000)='.@\xdd[\xd0.eth1/*bdev,user(\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x80000, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=virtio,access=', @ANYRESDEC=r3, @ANYBLOB="2c6673757569643d3634350a61326636302d387e62362d396377352d653433612d7cfa6466636538342c7375626a5f757365723d2f297070703047504c267b2c65756964", @ANYRESDEC=r4, @ANYBLOB=',\x00']) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 03:12:42 executing program 2: getxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=@known='system.advise\x00', &(0x7f00000000c0)=""/53, 0x35) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) getpid() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f0000000100)) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x1c) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x9, 0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000240)) r2 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000180)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) unshare(0x40000000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x41004000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)=@deltfilter={0x15f0, 0x2d, 0x3, 0x70bd29, 0x25dfdbfc, {0x0, r3, {0x10, 0xc}, {0xa, 0xffff}, {0xfff2, 0x3}}, [@TCA_RATE={0x8, 0x5, {0x100, 0xffffffffffffffff}}, @filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x14c8, 0x2, [@TCA_ROUTE4_POLICE={0xc, 0x5, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6}}, @TCA_ROUTE4_IIF={0x14, 0x4, 'bond_slave_1\x00'}, @TCA_ROUTE4_ACT={0x14a4, 0x6, @m_police={0x14a0, 0xe, {{0xc, 0x1, 'police\x00'}, {0x488, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0x0, 0x0, 0x3f, 0x6, {0x9, 0x1, 0x2, 0x0, 0x800, 0x7ff}, {0x7fffffff, 0x1, 0x7fff, 0x50, 0xfffffffffffffe00, 0x5}, 0xdca4, 0x7d8e, 0xd281}}, @TCA_POLICE_RATE={0x404, 0x2, [0xffff, 0x9, 0x3ff, 0xfc19b5b, 0x9, 0x0, 0xcdb, 0x3, 0x10000, 0x7f000000000, 0x4, 0xffffffffffffffff, 0x665, 0x9, 0x159, 0x3, 0x7fffffff, 0x2, 0x8, 0x6, 0x1, 0x101, 0x2, 0x80000000, 0x3, 0x4, 0x1, 0x856b, 0x1, 0x3b4c, 0xfffffffffffffffd, 0x3, 0x6, 0x800, 0x0, 0xc3e, 0x1ff, 0x7, 0x1, 0x80000001, 0x7, 0x2, 0x6, 0x8a, 0x3, 0x5, 0x5, 0x3, 0x9, 0x10001, 0x1, 0xdf5, 0x5, 0x0, 0x3, 0x4, 0x9, 0x9, 0x0, 0x4, 0x8001, 0x9, 0x2, 0xff, 0x5, 0x0, 0x2, 0x2, 0x8, 0x7, 0xf0, 0xfffffffffffffffe, 0x0, 0x9, 0x7fffffff, 0x7fff, 0xffff, 0x5, 0x4, 0x444, 0x6, 0x8, 0x3, 0x4, 0xffffffff, 0x2, 0x123, 0x227748e5, 0x8001, 0x8000, 0x80000000, 0x6, 0x9, 0x4b2, 0x80000001, 0x8, 0x4, 0x8, 0x7fffffff, 0x4, 0x3, 0x7fffffff, 0x1, 0x80000000, 0x3343, 0x0, 0x8, 0x100000001, 0x0, 0x7fffffff, 0xef42, 0x10000, 0x9d2, 0xfffffffffffffff7, 0x2, 0x5, 0x9, 0x7ff, 0x1, 0x445, 0xffffffff, 0x7, 0x400, 0x2, 0x739a, 0x4, 0x3e9b, 0x1, 0x600000000, 0x9, 0x1, 0x6, 0x74, 0x9, 0x1, 0x81, 0x7ca9, 0x6, 0x8, 0x2, 0xfff, 0x2, 0x8, 0x7280, 0xfffffffffffffffe, 0x80, 0x5, 0xd65, 0xffffffff9baea9d8, 0x7, 0x8, 0x800, 0xfd43, 0x100000001, 0x1ff, 0x5, 0x4, 0x4, 0xbd2, 0x9, 0x10000, 0x1f, 0x10000, 0x20, 0xffffffffffffffe0, 0x5, 0x10001, 0x2b, 0x6, 0x7, 0xfffffffffffeffff, 0x0, 0x7ff, 0x3, 0x7, 0x80, 0x4, 0x5, 0x8, 0x3, 0x6, 0x4, 0x9d9, 0x2, 0x3, 0x100, 0xb36, 0x9, 0xfffffffffffffff9, 0xffffffff, 0xffffffffffffff00, 0x0, 0x9, 0x5, 0x0, 0x3, 0x7, 0x890, 0xa000, 0xc14, 0x416, 0x4, 0x401, 0x410cb9d9, 0x3f, 0xb5b1, 0x55, 0x9, 0xffffffffffff7fff, 0x9, 0x0, 0x8, 0xfffffffffffffff7, 0x5, 0x3, 0x401, 0x8, 0x7, 0x8, 0x3, 0x8000, 0x10001, 0x7, 0x1, 0x0, 0x4, 0xffffffffffffff81, 0x6, 0x4, 0x9, 0x0, 0x6, 0x5, 0x7, 0x77b, 0x3, 0x451a, 0x6, 0x1, 0x19af0888, 0x1e0b, 0x7, 0x20, 0x5cba, 0xffffffff, 0x6, 0x620a, 0xffffffffffff8cab, 0x8, 0x80, 0xcb, 0x101, 0x3, 0x400000000, 0x401, 0x2]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x100000000, 0x5, 0x800, 0x1, 0x7ce, {0x9, 0x1, 0xffffffff, 0x8, 0x5, 0x7fffffff}, {0x8001, 0x1, 0x1, 0x0, 0x3, 0x8}, 0x46df, 0xe7}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}]}, {0x1004, 0x6, "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"}}}}]}}, @filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0xe4, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0x28}, @TCA_ROUTE4_TO={0x8, 0x2, 0xa5}, @TCA_ROUTE4_FROM={0x8, 0x3, 0xa}, @TCA_ROUTE4_TO={0x8, 0x2, 0x8001}, @TCA_ROUTE4_ACT={0x9c, 0x6, @m_simple={0x98, 0xf, {{0xc, 0x1, 'simple\x00'}, {0x3c, 0x2, [@TCA_DEF_PARMS={0x18, 0x2, {0x3, 0x3, 0x10000003, 0x1}}, @TCA_DEF_DATA={0x8, 0x3, '^\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x4, 0x7fffffff, 0x5, 0x5, 0x15c}}]}, {0x48, 0x6, "5170a1e39872e3e847b80370f887e7485877218c9e7aa9460f7d879e4043a9b0aeaa599e38e77efa9835c4ac43be37979583a63297f3d8f862500b9936866d95d161"}}}}, @TCA_ROUTE4_IIF={0x14, 0x4, 'caif0\x00'}, @TCA_ROUTE4_FROM={0x8, 0x3, 0x83}, @TCA_ROUTE4_TO={0x8, 0x2, 0x5c}]}}]}, 0x15f0}}, 0x1) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='system.advise\x00', 0xe, 0x3) fcntl$setstatus(r4, 0x4, 0x2c00) fcntl$setstatus(r4, 0x4, 0x0) ioctl$int_in(r1, 0x0, &(0x7f0000000000)=0x3) 03:12:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x8, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:43 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) lsetxattr$security_smack_entry(&(0x7f0000000180)='./file1\x00', 0x0, &(0x7f0000000240)='%]\x00', 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000640)={0x74, 0x29, 0x1, {0x0, [{{0x80, 0x2, 0x8}, 0xe0000000000, 0x1, 0xd, './file0/file0'}, {{0x0, 0x0, 0x4}, 0x0, 0x0, 0xd, './file0/file1'}, {{}, 0x8, 0x6, 0x7, './file0'}]}}, 0x74) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0xfffffffffffffffe, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000000)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, r3) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) connect$unix(r0, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e22}, 0x6e) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 03:12:43 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) tgkill(r3, r4, 0x3b) write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x6, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 487.445013] device nr0 entered promiscuous mode 03:12:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=0x4) ioctl$RTC_WIE_ON(r1, 0x700f) shmget(0x1, 0x2000, 0x78000000, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000500)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) getgroups(0x4, &(0x7f0000000600)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) lchown(&(0x7f0000000180)='./file0\x00', r3, r4) [ 487.557941] IPVS: ftp: loaded support on port[0] = 21 03:12:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x0, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:43 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0xffff, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc040564a, &(0x7f0000000140)={0x0, 0xfffffffffffffffc}) socket$bt_bnep(0x1f, 0x3, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000040)) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000000)={0x6, 0x1, 0x3f, 0x6, 0x4}, 0xc) 03:12:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r3 = shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x0, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) r3 = shmget(0x0, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000240)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000004c0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000500)={r4, r5, 0x2000000000}) 03:12:44 executing program 2: pipe(0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x81, 0x0) fchdir(r0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000000c0)) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r1, 0x1, 0x0, 0x369e5d84) fstat(r0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6b672299, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$VFIO_SET_IOMMU(r1, 0x3b66, 0x7454e508690e7eb1) 03:12:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:44 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035a91d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000004c0)="4e182f50f70874d0cd772dd432a8456349c7e37c4b8f2332eb72078381a5e8d005c4e28fdbe2a4397b114988956b61bd809c3c52c2eae6fba060e0bd7413f76403e9299ef496a4c5140f774354f3003cfcc25cb840324378fbe4dc2dcfa92479711d3382277a7e481ad1cc425b8cf79cfbb9daab9f0ced60cc484c14cf6bf366afba8850feedf35d9ed86c38983f1774e2045827c715f2b89bb81925e0225bf76b5fb140db8e0dcd9685f393ca001aa208a383e53534") 03:12:44 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RSTATFS(r0, &(0x7f00000001c0)={0x43, 0x9, 0x1, {0x3, 0x9, 0x80000000, 0x1, 0x67, 0x1, 0x1, 0x7fffffff, 0xff}}, 0x43) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x1ff) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000040)=0x4c000ffc, 0x3ff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400000, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000100)=r1) 03:12:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x0, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:44 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000004c0)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000140)='stack\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe491790bfb9d3ce6120f0cdc67444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a"], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:44 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x17, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x82000) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:12:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000040)=@newlink={0x48, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xc, @mcast1}]}}}]}, 0x48}}, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000ffc000/0x1000)=nil) 03:12:44 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000000c0)={0x800, 0x584e4f53, 0x9, 0x6, 0x3, @discrete={0x2, 0x100}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0_to_team\x00', 0x1b1) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x100000, @remote}, 0x1c) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x2, 0x4, 0x8, 0x4, 0x2, 0x749, 0x100000000}, 0x1c) r2 = semget(0x1, 0x2, 0x0) semctl$SETVAL(r2, 0xfb67532130e71c54, 0x10, &(0x7f0000000100)=0x8) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0xfff6) 03:12:44 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x4000, 0x4, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x80000) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x200000, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000002400)=[{&(0x7f00000000c0)="3900000013000d0468fe0704000000000000ff3f030000004500010700000014190004000aa12a86d2b1794a16c8e09ea42e00000800005d14", 0x39}], 0x1) 03:12:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xee01, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) setresuid(0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) clock_gettime(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000100)="807f78d8b5960f8dee3ee5c75e864955c4b1ad829069cea3b62b88b69b73b5f0d8fb6a4d956537782a7f82957e45483f9a9928df6f754eed1c3206741c348a33d8ce5a23118c37e53813b58d88abe36c5bdb093910e2c8e62469c752861dc7b92a9c862192ee"}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:12:45 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) truncate(&(0x7f0000000200)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x40000) [ 489.197031] gre0: Invalid MTU -2044026614 requested, hw min 0 [ 489.237063] gre0: Invalid MTU -2044026614 requested, hw min 0 [ 489.372192] audit: type=1804 audit(1565665965.231:101): pid=19348 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir825437677/syzkaller.QRtfB9/48/bus" dev="sda1" ino=17705 res=1 03:12:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:45 executing program 2: r0 = socket(0x30002000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) signalfd4(r0, &(0x7f0000000100)={0x7}, 0x8, 0x80000) 03:12:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000240)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000004c0)={{0x310000000, 0x2}, 0x8cc5f36dd0b9b783, 0x1, 0x4, {0x8001, 0x6}, 0x9dd9, 0x20}) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 489.567370] audit: type=1804 audit(1565665965.361:102): pid=19351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir825437677/syzkaller.QRtfB9/48/bus" dev="sda1" ino=17705 res=1 03:12:45 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x0, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:45 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x17c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x438000, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x1f, @local, 0xffffffff7fffffff}, 0x1c) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) fcntl$setstatus(r1, 0x4, 0x8000000000044000) io_submit(0x0, 0x34f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x8, 0x4) 03:12:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x1, 0x0) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e20, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}}}, &(0x7f0000000280)=0x84) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) sendto$ax25(r5, &(0x7f0000000180)="f841a541d155b811e0cc4232d1ea988035eed355c7cfb8f5d9efbcf1e2fdb4efd997aaaaed850a355e392665dc1e89d13ea4920c1805acd7fa5fc4bc36bf70ad35e23ad79aed108e2679dd97aeb6efbb", 0x50, 0x80, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000)) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, r1, 0x0) 03:12:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:45 executing program 2: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000274000/0xf000)=nil, 0x3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xc0001, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000040), 0x4) 03:12:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000240)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:45 executing program 5: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = dup(r0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f00004dbfc0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) 03:12:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) r3 = request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='$-posix_acl_accesscpuset;+self\x00', 0xfffffffffffffffe) keyctl$set_timeout(0xf, r3, 0x100) 03:12:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x8000, 0x0) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2, 0xe, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000f6ffffff0600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac26a100000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff00523b0000000000"], 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000300)) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)={0x2, 0x800000000000012, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 03:12:45 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in=@empty, @in=@loopback}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) 03:12:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 490.082130] binder: 19399:19405 ioctl c018620b 0 returned -14 03:12:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0xaf06, 0x401, 0x8, 0x8000, 0x5}, 0x118) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:46 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1ff, 0x4000) setsockopt$inet6_dccp_int(r0, 0x21, 0x5, &(0x7f0000000040)=0xfff, 0x4) clock_adjtime(0x0, &(0x7f00000002c0)={0x27ff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xfffffffffffffbc2}) 03:12:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)=0x2ad) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={0x0, 0xfffffffffffffffe}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000500)={r3, 0x5}, &(0x7f0000000540)=0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r2, &(0x7f0000003480)=[{{&(0x7f00000011c0)=@generic, 0x80, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x5, &(0x7f00000027c0)=""/243, 0x500}}], 0x500, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1002000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x9c, r3, 0x1f52673f1799d99f, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd127}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) shutdown(r2, 0x0) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000e40), 0x4) 03:12:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x44080) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0xffffffff, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 03:12:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x200102) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r0}) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') 03:12:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ng\xe8\xbd\f\xc7\xe3\x9fwtat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000240)) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:46 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:46 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x197f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, 0x0) tkill(r2, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000100)=""/228) chdir(&(0x7f0000000340)='./file0\x00') fstat(0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000000)=0x240000000000, 0x4) fallocate(r3, 0x0, 0x0, 0x110001) 03:12:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") unshare(0x8000400) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x412300, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000000)) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) getsockname(r4, &(0x7f0000000100)=@alg, &(0x7f00000001c0)=0x80) 03:12:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYRES32=r3, @ANYBLOB="37000000f539b5b9ac950947f0abd856f575ad99e294b56c0172ce68360994cda5ab04cf407a7da9a5d1ef9aa0898ee88aa6fa219de7eaf9edce56"], &(0x7f00000005c0)=0x3f) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0xaf06, 0x401, 0x8, 0x8000, 0x5}, 0x118) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:47 executing program 5: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mlockall(0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) 03:12:47 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16ba97439eb919e2debb3fe24ddcbc252a81f686a616ad5ccaf6a5958ff1e816ed7acf819a5581abe3b85e4f46412c6e9800bb9298a2650657838dfa4209bdc"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x1482, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:47 executing program 3: r0 = accept4(0xffffffffffffff9c, &(0x7f0000002000)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002080)=0x80, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="7b3f5043fc5efc3ef49aed67f3427f5e20fe6565dd71b7af4884740524132f3e4af8ff8af81a7770ad6ddc580db748f5a8e9c99bbf5440039c2ab22bf872015f31e80240e47219af2ac899585de46dd5af4fc62d7e90b96ee2c1b6fa2b46188475710f274400ea377188c922a84bf40934188b121a398f21db3f512837bacc0bb6a2342422de259014000d7f8e04052ce7c211ad4ee84f938199ef2c64a6224fe23537cf79efb9294d16e1fa95579ee07438"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', r1}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000600)="89f3edc2fe4d614e90ce8a1e2847d83c236e3e5c285e5778dadf110935996e0947cfcdbc768dfc95622bbca667c952dcf5db11146573f03b71035b3ca0b0af630f204447948da198e95bfbfc4ec7545425549ab7f150fbc083e648e339cbe964ed424f31934945ffed780b7ccdbfa422fb757aa8fd4a548735d4e889ac9c80a8fa39f9d679a32d84adcd3beb86363f9e7f71f8d12713f6ba50785a296580b2b620985ddcb76a0688d2af21dc3c608e56ac870cc43e40a8df5fb5270284849ff0e16e53", 0xc3, 0xf4}], 0x10000, &(0x7f0000000240)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}, {@nolargeio='nolargeio'}, {@nolargeio='nolargeio'}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000500)=0xc) syz_open_pts(0xffffffffffffffff, 0x400001) listen(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x4e22, @broadcast}}) fdatasync(r2) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008914, &(0x7f00000003c0)="0adc1f123c") syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000400)=""/44, &(0x7f0000000100)=0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:12:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000240)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmget$private(0x0, 0x4000, 0xbc5426cedc7af9fc, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:47 executing program 3: r0 = accept4(0xffffffffffffff9c, &(0x7f0000002000)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002080)=0x80, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="7b3f5043fc5efc3ef49aed67f3427f5e20fe6565dd71b7af4884740524132f3e4af8ff8af81a7770ad6ddc580db748f5a8e9c99bbf5440039c2ab22bf872015f31e80240e47219af2ac899585de46dd5af4fc62d7e90b96ee2c1b6fa2b46188475710f274400ea377188c922a84bf40934188b121a398f21db3f512837bacc0bb6a2342422de259014000d7f8e04052ce7c211ad4ee84f938199ef2c64a6224fe23537cf79efb9294d16e1fa95579ee07438"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', r1}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000600)="89f3edc2fe4d614e90ce8a1e2847d83c236e3e5c285e5778dadf110935996e0947cfcdbc768dfc95622bbca667c952dcf5db11146573f03b71035b3ca0b0af630f204447948da198e95bfbfc4ec7545425549ab7f150fbc083e648e339cbe964ed424f31934945ffed780b7ccdbfa422fb757aa8fd4a548735d4e889ac9c80a8fa39f9d679a32d84adcd3beb86363f9e7f71f8d12713f6ba50785a296580b2b620985ddcb76a0688d2af21dc3c608e56ac870cc43e40a8df5fb5270284849ff0e16e53", 0xc3, 0xf4}], 0x10000, &(0x7f0000000240)={[{@usrjquota_file='usrjquota=syz'}, {@notail='notail'}, {@nolargeio='nolargeio'}, {@nolargeio='nolargeio'}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000500)=0xc) syz_open_pts(0xffffffffffffffff, 0x400001) listen(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x4e22, @broadcast}}) fdatasync(r2) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008914, &(0x7f00000003c0)="0adc1f123c") syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000400)=""/44, &(0x7f0000000100)=0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:12:47 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f0000000440)=ANY=[@ANYRESHEX=0x0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES64=0x0, @ANYRESDEC=r2], @ANYRESHEX=r0, @ANYRESHEX=r2], 0x5) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) set_mempolicy(0x3, &(0x7f00000002c0)=0x2b6, 0x80000001) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000240)={0x24, 0x21, 0x6, 0x1f, 0x8, 0x0, 0x6, 0xe}) pipe(&(0x7f0000000300)) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f00000004c0)={'tunl0\x00', 0x0, 0x3ff}) 03:12:48 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x40, 0x1) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:48 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x80000802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000003c40)) recvfrom$ax25(r0, &(0x7f0000000f00)=""/52, 0x34, 0x20, &(0x7f0000001040)={{0x3, @bcast, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r3 = creat(&(0x7f0000000200)='./file1\x00', 0x0) clone(0x1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(r2, &(0x7f0000001100)=ANY=[@ANYBLOB="70e88149b51b8dcc02794c68f1e17171c98be1566446ab23ba4e4f2555c82a38b0a1ac984b"], 0xa) recvmmsg(r2, &(0x7f00000039c0)=[{{&(0x7f00000008c0)=@tipc, 0x80, &(0x7f0000000980)=[{&(0x7f0000000180)=""/3, 0x3}, {&(0x7f0000000940)}], 0x2}, 0x3}, {{&(0x7f00000009c0)=@nl, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000a40)=""/205, 0xcd}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/252, 0xfc}], 0x3, &(0x7f0000002140)=""/4096, 0x1000}, 0xffffffffffff1149}, {{&(0x7f0000000c80)=@ax25={{0x3, @null}, [@null, @null, @bcast, @netrom, @default, @netrom, @bcast]}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000000d00)=""/13, 0xd}, {&(0x7f0000000d40)=""/23, 0x17}, {&(0x7f0000000d80)=""/196, 0xc4}, {&(0x7f0000000e80)=""/90, 0x5a}, {&(0x7f0000000f40)=""/61, 0x3d}, {&(0x7f0000000f80)=""/149, 0x95}, {&(0x7f0000003140)=""/111, 0x6f}, {&(0x7f00000031c0)=""/223, 0xdf}], 0x8, &(0x7f0000003340)=""/142, 0x8e}, 0x4}, {{&(0x7f0000003400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/155, 0x9b}, {&(0x7f0000003540)=""/94, 0x5e}, {&(0x7f00000035c0)=""/64, 0x40}, {&(0x7f0000003600)=""/230, 0xe6}, {&(0x7f0000003700)}, {&(0x7f0000003740)=""/243, 0xf3}], 0x6, &(0x7f00000038c0)=""/222, 0xde}, 0x8}], 0x4, 0x22, &(0x7f0000003ac0)={0x0, 0x1c9c380}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000003b00)='P\xe2\xc4K\xf6}.\x1fnfs4\x00\x0f@5\xca6\xd6\f\xfb28C\xaa\xdcIRE\xf3\x94\xc5\x02\xd4\xa8\xa9\"\x1d\fSe\x80\x00\x00\x00\x00\x00\x00\x00\xb7+\xb0\xd2.\x01XU\xcb\x86\x9c\xb0\xda\f\xe0\xd2\x1f\x7f`X\x82>kQ\x8f\x03hm\xceg\x03\xdc3I\xa2\x8az\x19\x1a\x00'/99, 0xc0c0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000003bc0)={{0x4, 0x1000, 0x3}, 'syz1\x00'}) getpgid(0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={@empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0xf}, 0x6, 0x9, 0x5, 0x100, 0x9e06, 0x40a00010}) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x4) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000010c0)={0x8b, 0x0, 0xb2}) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000880)='y\x00', 0x2, 0x1) connect$tipc(r3, &(0x7f0000003b80)=@name={0x1e, 0x2, 0x3, {{0x41}}}, 0x10) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000940)=0x7b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 03:12:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0xaf06, 0x401, 0x8, 0x8000, 0x5}, 0x118) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 492.758258] input: syz1 as /devices/virtual/input/input7 [ 493.023028] input: syz1 as /devices/virtual/input/input8 03:12:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0xaf06, 0x401, 0x8, 0x8000, 0x5}, 0x118) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a18d2e9bceeb01fd0b4dd393bb9ea66c9cf6f97b20697b820e528057d906a57a9ebea4d59d6fa14d"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x6964) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) r3 = geteuid() stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000240)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x7, 0x4, &(0x7f0000000740)=[{&(0x7f0000000300)="6e97747661ccf4d32d03bf1ca0746a0cedf87c9e0005ea02e0d1d6e313820f1bdaf9d42b979fd189db5f7b", 0x2b, 0x7}, {&(0x7f0000000340)="0ca2b2552562902b316f39a6eb53aaba668f8594cbd4ef76bc996e41e55fb531cdd0494cbeee4c0ad6e1e656b297ba2302a92512fb301c0a4c6d71224834e54bfebbe55142bdf934ca5965dfe851623c23cbb33e5513ba71dd3ec76535aa9080faa22389c7ef28a16183ab7ac962861dc56712db7177da8aaa4acdf0436cfca3bf14ebe33b58be07926ad47fd99fd852a06011", 0x93, 0x91b}, {&(0x7f0000000400)="dbf8a94c16e79d86ce19076e43511bddb5325d51b04a18675aa4aef152ebffed5367a0be724ca8996b0c1a857b5f27d0466ac3466572153c02c84221d72be189c02084035a61d59a9a1bf0bf3ec604ddd0148edfe80f54340c2930b49a42324ae41d89c43a71da64c66fc746f898a1e80bb9ff53ad65742eb4bbccf77e5ca7d9fde42cb720bd7041c2dbe28b0b", 0x8d, 0x7}, {&(0x7f00000004c0)="37dd7ace74e6aea9dc00ca2d29428f3c05", 0x11, 0x1}], 0x8000, &(0x7f0000000880)={[{@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}], [{@permit_directio='permit_directio'}, {@appraise_type='appraise_type=imasig'}, {@fsname={'fsname'}}, {@euid_lt={'euid<', r3}}, {@context={'context', 0x3d, 'root'}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@subj_role={'subj_role', 0x3d, '/dev/nullb0\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_eq={'euid', 0x3d, r4}}]}) 03:12:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:49 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0xd6, "bf0e3606f3f2b0935ae495842d1c7e3460bfd761498ab9d989660e36671da8c4fe11374a837534396cd9ec13a67217b8b6dd379b1d2ffb3b959e81efe6a95180d13a1af6b3d03bc488e0197c873551c82851e756c4883b1b94994b5051a002cd92054b37fe2468406f566150b71e458f6db19356a1f1f66e66d8b79fcc70101466359310591f48c47b691eeb43910088f1785c185f4160fa8a0e472ab58dff57190eeee19eda7cf2eef0ffce910e3e27585972a39ee2a7efb8569c57c7fc7a80b1fba309fe8fc502eb5482970aae2d48ded2a53ff1c16b9292bceacc51f0c05832a9ae4446836bc0e55a8d178de1eb523e46669ad3c3d5fe4fd55e767816b58c", 0xc4, 0xffffffffffffffff, 0x6, 0x3, 0x9, 0x7ff, 0x9, 0x1}, r2}}, 0x128) close(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200001, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000200)) 03:12:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x68, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe491"}, 0x180) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0x400400) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000180)) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 03:12:49 executing program 3: ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x20000000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x80000000, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f00000000c0)={r3, 0x1}) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000440)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x7c, r4, 0xc20, 0x70bd29, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x20000000000000, 0x0, 0x4, 0x3, 0x80000000]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1f}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x5d33, 0x10000, 0x9, 0x4, 0x2]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7c406e12}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8800}, 0x40040) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000380)={r2, 0x7f3e3dbd427efb02}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000640)={r5, 0x10000, 0x5, 0x80000000}, &(0x7f0000000680)=0x10) r6 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) mount(&(0x7f0000001a00)=@md0='/dev/md0\x00', &(0x7f0000001a40)='./file0\x00', &(0x7f0000000580)='hugetlbfs\x00', 0x2, 0x0) connect$rds(r1, &(0x7f0000000280)={0x2, 0x4e21, @remote}, 0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={0x0, 0xff}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f00000003c0)={r7, 0x100000000}, 0x8) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_log_t:s0\x00', 0x1f, 0x2) [ 493.710434] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "permit_directio" 03:12:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a18d2e9bceeb01fd0b4dd393bb9ea66c9cf6f97b20697b820e528057d906a57a9ebea4d59d6fa14d"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x6964) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) r3 = geteuid() stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000240)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x7, 0x4, &(0x7f0000000740)=[{&(0x7f0000000300)="6e97747661ccf4d32d03bf1ca0746a0cedf87c9e0005ea02e0d1d6e313820f1bdaf9d42b979fd189db5f7b", 0x2b, 0x7}, {&(0x7f0000000340)="0ca2b2552562902b316f39a6eb53aaba668f8594cbd4ef76bc996e41e55fb531cdd0494cbeee4c0ad6e1e656b297ba2302a92512fb301c0a4c6d71224834e54bfebbe55142bdf934ca5965dfe851623c23cbb33e5513ba71dd3ec76535aa9080faa22389c7ef28a16183ab7ac962861dc56712db7177da8aaa4acdf0436cfca3bf14ebe33b58be07926ad47fd99fd852a06011", 0x93, 0x91b}, {&(0x7f0000000400)="dbf8a94c16e79d86ce19076e43511bddb5325d51b04a18675aa4aef152ebffed5367a0be724ca8996b0c1a857b5f27d0466ac3466572153c02c84221d72be189c02084035a61d59a9a1bf0bf3ec604ddd0148edfe80f54340c2930b49a42324ae41d89c43a71da64c66fc746f898a1e80bb9ff53ad65742eb4bbccf77e5ca7d9fde42cb720bd7041c2dbe28b0b", 0x8d, 0x7}, {&(0x7f00000004c0)="37dd7ace74e6aea9dc00ca2d29428f3c05", 0x11, 0x1}], 0x8000, &(0x7f0000000880)={[{@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}], [{@permit_directio='permit_directio'}, {@appraise_type='appraise_type=imasig'}, {@fsname={'fsname'}}, {@euid_lt={'euid<', r3}}, {@context={'context', 0x3d, 'root'}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@subj_role={'subj_role', 0x3d, '/dev/nullb0\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_eq={'euid', 0x3d, r4}}]}) 03:12:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x68, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe491"}, 0x180) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x8000, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0xaf06, 0x401, 0x8, 0x8000, 0x5}, 0x118) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) syz_read_part_table(0xfffffffffffffff7, 0x1, &(0x7f0000000100)=[{&(0x7f0000000580)="6bbce627c7b880d31fa5809fa92d661c0199692416b1c233f682dcb5c0837dcdedd99b31c916a483df94e49e2b90a91407e57bec60387db6b0ef672d1004d928aaac6d2110e44e4aac23f3cc98b304ee874c5f5e85d9c5305dee36337e625e6771d4a6defa57d4eea9f50491e7512bad08e1f93bffa948d4536515d0e09bec5587fd815eaa1a60a506cc53e94841abf0675eef", 0x93, 0xf15f}]) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b00000000"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x604, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={0x0}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000500)={r3, 0x3ff, 0x9, [0x3, 0x3, 0xffffffffffffff80, 0x4, 0x8d, 0x8001, 0x4, 0x100000000, 0x1ff]}, 0x1a) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/545], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000240)={0x2, "e7bd6340b106a195cbf3da8ad873f56b64685618a7dd619c89e8ee7bb3b883ea", 0x1, 0x1}) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0xfd, 0x80000004004400}) 03:12:51 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x801, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000005c0)={0x800, 0x100, 0xcb, &(0x7f00000004c0)="7a7dc3f3ac376da9921a260fa5b50225e132ce464d856c51711a3883926d0339675685adb2ed8543ac410310b0a9476a12a7e15b5bb8d208c6431066f22c750a4f7fc0e81342af7235484def885291dba34b2aeb548bcad8c762ff2d57400d07c42f175fca9a3228ac7beb6b5efc897cf6da9942dec5687dffaec17930ae0baa4294d3562385a4f3260b813bb89896bd52432a37b1333068a8c90b8092d0e716b66b1e8ce300d5b7f82477803c0128aa51478eb29867c68b99c61ceed6453ae138ea40ba111cb4436788fd"}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000640)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x81000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x24, r2, 0x200, 0x70bd27, 0x88, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x5, 0x1746, 0x3]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x80) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r3, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x68, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe491"}, 0x180) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) syz_read_part_table(0xfffffffffffffff7, 0x1, &(0x7f0000000100)=[{&(0x7f0000000580)="6bbce627c7b880d31fa5809fa92d661c0199692416b1c233f682dcb5c0837dcdedd99b31c916a483df94e49e2b90a91407e57bec60387db6b0ef672d1004d928aaac6d2110e44e4aac23f3cc98b304ee874c5f5e85d9c5305dee36337e625e6771d4a6defa57d4eea9f50491e7512bad08e1f93bffa948d4536515d0e09bec5587fd815eaa1a60a506cc53e94841abf0675eef", 0x93, 0xf15f}]) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b00000000"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x604, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={0x0}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000500)={r3, 0x3ff, 0x9, [0x3, 0x3, 0xffffffffffffff80, 0x4, 0x8d, 0x8001, 0x4, 0x100000000, 0x1ff]}, 0x1a) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:51 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') clock_adjtime(0x7, &(0x7f00000004c0)={0x1, 0x1, 0x1, 0x1f, 0x8, 0x8, 0xebb, 0x3, 0x3, 0x10000, 0x1ff, 0x1, 0x21f4ff66, 0xc2, 0xfffffffffffffffc, 0x5, 0xff, 0x10000, 0x5, 0x8001, 0x8, 0x8, 0xca14, 0x2, 0xfff, 0xfffffffffffffffd}) write$UHID_CREATE2(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df8306a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9beb4aa393fe49179445840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b00"/487], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) read$eventfd(r0, &(0x7f0000000240), 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) utimensat(r2, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={{0x77359400}, {0x77359400}}, 0x100) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0, 0xaf06, 0x401, 0x8, 0x8000, 0x5}, 0x118) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCONS(r0, 0x541d) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x10000, 0x0) getsockname$inet(r1, &(0x7f0000000580)={0x2, 0x0, @initdev}, &(0x7f00000005c0)=0x10) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000000)) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xfffffffffffffff9, 0x80040) r3 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x80, 0x800) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000200)={0x6, r3, 0x1}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x28000, 0x0) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r5, 0x9) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="3f0200000b3103acf90774391376b7c3fa54e726dd42d533a5e8c99612bf4205dfacb04be9beab2c29b585bc3127dbfa7d41575b9b6ec060aca4187136d5ff92062cb2f1525a829eec17f9c3abf6f73bf10c827cfff13533e163b1175b807b418b9b15eec1d4f3501fa99e9beab81076767c45ae5ff371e51c54347e9552809580f8853529fb61e1a0570e0aabb19f410dc59e507b9d91f6c5175c4a038b59597a981f26ac1c34a2cab228b2ee90d1967259f979a26fa8860882f0516ae76d8272d7a8e3edf5d8f4da660403", @ANYRES16=r6, @ANYBLOB="00082bbd7000ffdbdf250d000000080005000700000008000400ffff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40001) getsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000000380)=""/225, &(0x7f0000000480)=0xe1) 03:12:51 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)=0xe5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000004c0)=0xc) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000540)=0x5) r3 = syz_open_procfs(r1, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179440c1af2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f00000005c0)={0x3, 0x8, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2a9c357df4720b1d}, 'team0\x00'}) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) write$selinux_user(r3, &(0x7f0000000180)={'system_u:object_r:system_dbusd_var_lib_t:s0', 0x20, 'system_u\x00'}, 0x35) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0xbd402471c211ee19, &(0x7f00000000c0), &(0x7f0000000580)=0x17c) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) syz_read_part_table(0xfffffffffffffff7, 0x1, &(0x7f0000000100)=[{&(0x7f0000000580)="6bbce627c7b880d31fa5809fa92d661c0199692416b1c233f682dcb5c0837dcdedd99b31c916a483df94e49e2b90a91407e57bec60387db6b0ef672d1004d928aaac6d2110e44e4aac23f3cc98b304ee874c5f5e85d9c5305dee36337e625e6771d4a6defa57d4eea9f50491e7512bad08e1f93bffa948d4536515d0e09bec5587fd815eaa1a60a506cc53e94841abf0675eef", 0x93, 0xf15f}]) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b00000000"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x604, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={0x0}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000500)={r3, 0x3ff, 0x9, [0x3, 0x3, 0xffffffffffffff80, 0x4, 0x8d, 0x8001, 0x4, 0x100000000, 0x1ff]}, 0x1a) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 495.706923] audit: type=1804 audit(1565665971.552:103): pid=19614 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="nullb0" dev="sda1" ino=17180 res=1 03:12:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0xfffffffffffffffe}}, 0x4e) 03:12:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) syz_read_part_table(0xfffffffffffffff7, 0x1, &(0x7f0000000100)=[{&(0x7f0000000580)="6bbce627c7b880d31fa5809fa92d661c0199692416b1c233f682dcb5c0837dcdedd99b31c916a483df94e49e2b90a91407e57bec60387db6b0ef672d1004d928aaac6d2110e44e4aac23f3cc98b304ee874c5f5e85d9c5305dee36337e625e6771d4a6defa57d4eea9f50491e7512bad08e1f93bffa948d4536515d0e09bec5587fd815eaa1a60a506cc53e94841abf0675eef", 0x93, 0xf15f}]) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b00000000"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x604, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={0x0}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000500)={r3, 0x3ff, 0x9, [0x3, 0x3, 0xffffffffffffff80, 0x4, 0x8d, 0x8001, 0x4, 0x100000000, 0x1ff]}, 0x1a) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:51 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)=0xfffffffffffffd06) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 495.862914] audit: type=1804 audit(1565665971.632:104): pid=19614 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="nullb0" dev="sda1" ino=17180 res=1 03:12:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0xc8e, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3c3, 0x4000) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fstatfs(r1, &(0x7f00000002c0)=""/4096) 03:12:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x9c, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae0"}, 0x1b4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:52 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) personality(0x805fffffa) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x90000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f0000000300)={0xa0, 0x19, 0x2, {0x1000, {0x80, 0x1, 0x1}, 0x20, r1, r2, 0x100000000, 0x70f, 0x4, 0x4, 0x8000, 0x1, 0x8, 0x3, 0x9, 0x200, 0xfffffffffffffffa, 0xffffffff, 0x7, 0x400, 0x7fff}}, 0xa0) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f00000002c0)) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 03:12:52 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afdaffb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) syz_open_dev$sndpcmp(&(0x7f0000002b40)='/dev/snd/pcmC#D#p\x00', 0x9, 0x4000) r3 = gettid() process_vm_writev(r3, &(0x7f0000000700)=[{&(0x7f00000004c0)=""/174, 0xae}, {&(0x7f0000000580)=""/175, 0xaf}, {&(0x7f0000000640)=""/162, 0xa2}, {&(0x7f0000000240)=""/26, 0x1a}], 0x4, &(0x7f0000002a80)=[{&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/8, 0x8}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/108, 0x6c}, {&(0x7f0000002800)=""/34, 0x22}, {&(0x7f0000002840)=""/176, 0xb0}, {&(0x7f0000002900)=""/222, 0xde}, {&(0x7f0000002a00)=""/53, 0x35}, {&(0x7f0000002a40)=""/29, 0x1d}], 0x9, 0x0) 03:12:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:52 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc2, 0x101000) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000080)) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r1, &(0x7f00000000c0)="d299000001dfaef69d43f86c3a978f0000f30501000b0003000000234777ed642ddc1b", 0xfffffffffffffffe) 03:12:52 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f000000b040)={'vcan0\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x20, 0x4) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) write$tun(r1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x4c, r6, 0x41e76d5ab0021568, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x943a}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4c084}, 0x20000080) 03:12:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x81, 0x20000) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000240)={{0x2c, @empty, 0x4e23, 0x3, 'nq\x00', 0xa, 0x6, 0x46}, {@local, 0x4e21, 0x3, 0x73, 0x2e3d, 0x1}}, 0x44) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000180)={0xaf, 0x14, [0x20, 0x7, 0x4, 0x100000001, 0x3b]}) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x60000) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x13) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0xffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(r3, &(0x7f00000000c0)='m\xec\xf2ori.ev9\xf9=\x85e', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x200e00) 03:12:52 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000440)={0x0, 0x0, @pic={0x101, 0x0, 0xffff, 0x41, 0x6, 0x0, 0x7fff, 0x8, 0x8000, 0x4, 0x271f, 0x1ff, 0xfffffffffffffffb, 0xa00000000000, 0x101, 0xf3e}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r4, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2f2f) write$P9_RLOPEN(r1, &(0x7f0000001400)={0x18, 0xd, 0x1, {{0x2, 0x0, 0x7}, 0xfffffffffffffd60}}, 0x18) shutdown(r4, 0x1) recvmsg(r4, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000400)=0x7f, 0x4) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f00000002c0)="922ab8859719cc43b5477ef7620de8ee423edfacc4580fd7235844f93966527185679605a02405050e2d8178eca765a89a857479d80d01b7555a1c7d441f3fc6435642a983d5f826c9", &(0x7f0000000340)="b50d05135640f8778301e626b3b856ed02e7c13882a36f58ad1d39c8a476e6f6a7f3ebdd8cf0164e259cf4a7397d54ae89a4308ec35f53e4746046054e9c1547784bcaf318877fbbca3c8019ae242c51c24063aef83717a15ab00afc857dcc0d7c00cfc846baf13cd3eecaa5d17ba97cc647d4662c4186687af93f9a65b5a00a09f62fea21cf751dba5e51578a77857e65702942ab9a31ef6b0731419afd550145dec674a4dced0b670ccd3a7d14ff705450cd6ad8a4dddba2a823ab", 0x2}, 0x20) [ 496.666586] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. [ 496.761199] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 03:12:52 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x7dda6595}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x3) bind$x25(r2, &(0x7f0000000100)={0x9, @remote={[], 0x2}}, 0x12) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x21}) fcntl$lock(r1, 0x24, &(0x7f0000000040)) 03:12:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x620002) r2 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) r3 = dup2(r0, r2) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x8001) 03:12:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RSTAT(r2, &(0x7f0000000300)=ANY=[@ANYBLOB='Q\x00\x00'], 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x401}, 0x0) sendfile(r2, r2, &(0x7f0000000140), 0x7fff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:12:53 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000840)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000880)) r1 = socket$inet6(0xa, 0x1, 0x2000000002) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000000), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x5e0) r4 = syz_open_procfs(0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', 0x0, &(0x7f0000000540)={'L-', 0x8}, 0x28, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000008c0)={@ipv4={[], [], @loopback}, 0x3ff, 0x1, 0x2, 0x2, 0x7, 0x7}, 0x20) recvmsg$kcm(r4, &(0x7f00000005c0)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/38, 0x26}, {&(0x7f00000002c0)=""/112, 0x70}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000000980)=""/84, 0x54}, {&(0x7f0000000640)=""/253, 0xfd}, {&(0x7f0000000400)=""/165, 0xa5}, {&(0x7f0000000500)=""/10, 0xa}, {&(0x7f0000000580)=""/16, 0x10}], 0x8, &(0x7f0000000900)=""/75, 0x4b}, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000200)={0x17}) recvfrom$x25(r4, &(0x7f0000000040)=""/198, 0xc6, 0x40, &(0x7f0000000140)={0x9, @remote={[], 0x0}}, 0x12) 03:12:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x9c, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae0"}, 0x1b4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.\x03\x00\x00\x00', 0x200002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x90000, 0x0) init_module(&(0x7f0000000180)='\x00', 0x1, &(0x7f00000001c0)='cpuset.cpu_exclusive\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1, 0x100) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008911, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") truncate(&(0x7f0000000040)='./file0\x00', 0x8001) r4 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpu_exclusive\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x10) 03:12:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000003fa9d81a0b392039fa0b50a32466ca4b68d6998521b7141b07d177c5069013fc3864466405038e9e83c8dbf77586a94c2ffd75e5e566c9acf7754d0065650edcab553509914cbf3fbc5c381f5a649611e10d0137360741d11cd9d81a633e71a8887b0904f1624c156b12729218180191acbcb7b493a47788c4eb0ecaecd2be840c63b7c02f0952add39c52370745898dfa9374276568f821e73b07d716def310", @ANYRES32=0x0], &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x80000001, 0x200, 0x2, 0x1, r1}, &(0x7f0000000100)=0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000480)="a9", 0x1}], 0x1) 03:12:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000004c0)={0x5, &(0x7f0000000240)=[{}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000500)={r3, 0x2}) 03:12:53 executing program 3: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8002, &(0x7f0000000000)=0xb7b3, 0x1, 0x1) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="cf3a43773cc73f231584c6133a579f9d274267b973d09cbd0000dac2dbe0e42546173a1e1503735ed831b8e67013aa0cc1728bfb06fe283df63d6fb974f3614484c4b85a66b4876461b486e4977ab3f2576bf5cb84", 0x55, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f0000000200)=""/219, 0xdb) r1 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x7, 0x2000) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000340)=r2, 0x12) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000380)={0x4, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x2b}, 0x9}}, 0x0, 0x3, [{{0xa, 0x4e23, 0x2, @loopback, 0x8}}, {{0xa, 0x4e20, 0x81, @mcast1, 0x400}}, {{0xa, 0x4e21, 0x0, @mcast1, 0xfffffffffffffffc}}]}, 0x210) connect$rose(r1, &(0x7f00000005c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @null}, 0x1c) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20\x00', 0x40000, 0x0) connect$x25(r3, &(0x7f0000000640)={0x9, @remote={[], 0x1}}, 0x12) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000680)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000006c0)={0x0, 0x5, 0x2, [0xe2, 0x8001]}, &(0x7f0000000700)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000740)={r4, 0x1}, 0x8) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000780)={'nat\x00', 0x15, "c115d07e8b7db995fd6862087fdb60cba06d6c7ec6"}, &(0x7f00000007c0)=0x39) r5 = perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x1, 0x8001, 0x5, 0x3ff, 0x0, 0xffffffff, 0x8040, 0x2, 0x4, 0x6, 0xffffffffffffff5a, 0x1df, 0xfffffffffffffff7, 0x7, 0x7f, 0x3, 0xfff, 0x6, 0x8, 0x2, 0x0, 0x88, 0xb41, 0xf11e, 0x401, 0xfffffffffffffc00, 0x81, 0x8000, 0x7ff, 0x7, 0x1, 0xffffffffffffff8e, 0x4, 0x4, 0x430bf895, 0x8, 0x0, 0x4, 0x1, @perf_config_ext={0x100}, 0xa00, 0xfffffffffffffffa, 0x3, 0xb, 0x0, 0x4a44, 0x8}, r2, 0xe, r3, 0x8) fsync(r5) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000880)={r4, 0x1000, "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"}, &(0x7f00000018c0)=0x1008) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000001900)=""/102) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000001980)=0x2) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = syz_open_dev$radio(&(0x7f0000001a00)='/dev/radio#\x00', 0x0, 0x2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) close(r6) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000001a40)=0xf4240) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001a80)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000001ac0)=""/4096, &(0x7f0000002ac0)=0x1000) ioctl$BLKRRPART(r1, 0x125f, 0x0) ioctl$VIDIOC_G_CROP(r7, 0xc014563b, &(0x7f0000002b00)={0x9, {0xfff, 0x10000, 0x5, 0x101}}) ioctl$TIOCCBRK(r7, 0x5428) 03:12:53 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffc7}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="02090000030001800000020000800000"], 0x10}}, 0x0) recvfrom$inet6(r1, &(0x7f0000000200)=""/26, 0x1a, 0x2, &(0x7f0000000240)={0xa, 0x4e21, 0x1f, @dev={0xfe, 0x80, [], 0x27}, 0x80000001}, 0x1c) 03:12:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) times(&(0x7f0000000240)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000500)={0x4, 0x4, 0x4, 0x401000, {0x0, 0x2710}, {0x3, 0xc, 0xae, 0x5, 0x3, 0x81, "782ab253"}, 0x1, 0x4, @planes=&(0x7f00000004c0)={0x1ff, 0x405, @userptr=0x4, 0x3}, 0x4}) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:53 executing program 3: setrlimit(0x6, &(0x7f0000000040)={0x81, 0x69a}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)=ANY=[@ANYBLOB="1e000000020000006f6e4da5a977b7beed9b8d165ede7371bf53cfa6df552980f4c2fbba"], 0x20000) 03:12:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) connect$inet6(r1, &(0x7f0000000280), 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000002c0)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)=""/248, 0xf8}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000000440)=""/215, 0xd7}, {&(0x7f0000000540)=""/56, 0x38}, {&(0x7f0000000580)=""/130, 0x82}], 0x5, &(0x7f00000006c0)=""/113, 0x71}, 0xffffffffffff8001}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000740)=""/19, 0x13}], 0x1, &(0x7f00000007c0)=""/142, 0x8e}, 0x5}, {{&(0x7f0000000880)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/149, 0x95}], 0x1, &(0x7f0000000a00)=""/142, 0x8e}, 0x10001}, {{&(0x7f0000000ac0)=@caif=@dgm, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/234, 0xea}, {&(0x7f0000000c40)=""/247, 0xf7}, {&(0x7f0000000d40)=""/23, 0x17}, {&(0x7f0000000d80)=""/47, 0x2f}, {&(0x7f0000000dc0)=""/39, 0x27}, {&(0x7f0000000e00)=""/135, 0x87}], 0x7, &(0x7f0000000f40)=""/79, 0x4f}, 0x6}], 0x4, 0x0, &(0x7f0000000fc0)) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0xfffffffffffffeb2, &(0x7f0000000240)={&(0x7f0000000180)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 03:12:53 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) r2 = dup3(r1, r1, 0x80000) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000080)) close(r1) 03:12:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r2 = shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000240)) shmctl$SHM_UNLOCK(r2, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x80000000800, 0x4004400}) 03:12:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x9c, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae0"}, 0x1b4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:53 executing program 3: ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000440)={0x100, 0x3, 0xfffffffffffffff8, 0x1ff, 0x4}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6a2f5d0023f47bb702415a891b0f018f54f3"], 0x0, 0x12}, 0x20) r2 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0xf5, "b0bdf8086ebbc62bc559bc994d4b67c58e12e059ac19f3c154235dd64b06f85200328013917b88bd32e6cc7d133e1385184cabbd25a95952c14fce2b6b02dc7810034c84804251db449d83d3b5fc10dd79db3b6720e1d6dd669ec0d3ac0c76a7f7570c752e9da62276968871a16dff1724387eafd0ff5ce87b99b13c5779615bef1b1391731f10dee78b0bb0813883cf59292a203445885e472aac08e8f1228f387123514ea659321baf33faabc4e325be5bddcfbe1a4f4949d645768dc226cba15741c5ce8fb3cb0b2e6c621cfc3e72997baff75cd143c23a879d9902dede9b6469119738fccabfc4cd79bbc920f4b7c51741edaf"}, &(0x7f0000000400)=0xfd) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x2, 0x8, 0x9, 0x10000, 0x2a10}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x5) r5 = socket$kcm(0xa, 0x2, 0x73) getsockname(r5, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x80) 03:12:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x16) fcntl$setstatus(r2, 0x4, 0x42800) sendmmsg(r2, &(0x7f0000000140), 0xc0e8c8e08fca5, 0x0) dup2(r1, r2) 03:12:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000008c0)="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", 0x1000) recvmsg$kcm(r0, &(0x7f0000000880)={&(0x7f00000004c0)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000540)=""/114, 0x72}, {&(0x7f00000005c0)=""/177, 0xb1}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)}, {&(0x7f0000000740)=""/17, 0x11}], 0x6, &(0x7f0000000800)=""/84, 0x54}, 0x1) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r3 = shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) 03:12:54 executing program 5: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003940)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/139, 0x8b}], 0x1, &(0x7f0000000240)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) close(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:12:54 executing program 3: ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000440)={0x100, 0x3, 0xfffffffffffffff8, 0x1ff, 0x4}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6a2f5d0023f47bb702415a891b0f018f54f3"], 0x0, 0x12}, 0x20) r2 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0xf5, "b0bdf8086ebbc62bc559bc994d4b67c58e12e059ac19f3c154235dd64b06f85200328013917b88bd32e6cc7d133e1385184cabbd25a95952c14fce2b6b02dc7810034c84804251db449d83d3b5fc10dd79db3b6720e1d6dd669ec0d3ac0c76a7f7570c752e9da62276968871a16dff1724387eafd0ff5ce87b99b13c5779615bef1b1391731f10dee78b0bb0813883cf59292a203445885e472aac08e8f1228f387123514ea659321baf33faabc4e325be5bddcfbe1a4f4949d645768dc226cba15741c5ce8fb3cb0b2e6c621cfc3e72997baff75cd143c23a879d9902dede9b6469119738fccabfc4cd79bbc920f4b7c51741edaf"}, &(0x7f0000000400)=0xfd) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x2, 0x8, 0x9, 0x10000, 0x2a10}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x5) r5 = socket$kcm(0xa, 0x2, 0x73) getsockname(r5, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x80) 03:12:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:54 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x2) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000004c0)=0x400) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x60}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa, &(0x7f0000000700)=[{&(0x7f00000000c0)="749a3cb439236c9d6ea7fca415ce4d28f0c947fc0290648a87b13a25b17eb637915a1af0078174286f5fdcf32cf7425d9e38b28d250fa96b24fcd1b145c6c0f0d14b3b7e7c4caa672c93cd2fe98da8b0bf42a4004becade4e2862630cd7f1bdb0c8337a83bdf401c508a2be9ad1a723b77c4b85e21283465", 0x78, 0xffffffff7fffffff}, {&(0x7f0000000140)="0852377ccdbf4d8dbbbe069fed94f04dbd7b17c47fede6343b43f0bccc0c28e288bd0df0275559a1024ff498a6e09ebaf29747b8763574d1eceb544b7c9da1c56639c58b70f11266f0a0c8bf6965aa6e48fd973074c173842fde7e396195f88ad4f86cce4071b3fa241ef9648ce19d4af91f71944f1297bdc611bab55759fa5fb8a10c3a9fe48e77461ac1270a88193641da97993a8052ffc0b3afa02ef13bbf66201b6d23e9e66087fb3335f09b437446178bf349db6514d7334d3574e1", 0xbe, 0x1}, {&(0x7f0000000200)="fa11928bb2f8ce900f101d66d3737918fb80b86c5b829c4abed6ac50185cbe49e7526b9850562dad204be23570aeaddf519e4c9147e57cd50cc8f6bb6c7d842f1df432b40deb6b63e5e256960345a543331a5e655702b823115566bcc047889894599a2895dd4c4409f23830d9c35128995b20743e8fa89496", 0x79, 0x5}, {&(0x7f0000000280)="f76963d9c762cb573f052d01dc147394085e1597ef1227e97426dce4b3ea02286b047087bcb67ca699506f0d4df94d4071962ce8bb42859c99d5abc60ccfd7fddd827289bbfd0cfe74a7", 0x4a, 0x1}, {&(0x7f0000000300)="7ee6d34a9522cbf84c89412bf314ab622c3cb1d3ab241f4695adef9f6e42d13c71ece9744bd93a166f6f1ebd3b4b", 0x2e, 0x4}, {&(0x7f0000000340)="9ab900369d8d274cffd52bc6f9104cb72d4604aa4dd19ff6e01687a37c5c822acfc53b881ea852a9c148d0998c914acf0c643f7b65d33df122d54fb07b40be3e28da73447b84e17c26ef5419c5e3f9d3ac5b34301ed5124fef0c6fc6e78d4fe5aa68e353fa6707acf46d7b1b7fcbf614f927508d2ae06bb8046d79248709215901e30b5b107c936430ae81f7b4c5175b137ecafd", 0x94, 0x4}, {&(0x7f0000000400)="961ad39d8fffbcd9c1e457fb7769ef0fa03fb377788288cf7cd82d1a3e21a29912997cdd54e8663b53c8420dc5460c71ae6f5ede067aa99f390e78e2d9cc52ae956f879b0afe8875679586d95b67d61ee75b1b2f0c0cba17d169a65b6eafb48436950ae2d8d7bad761698e8f518a5e73528f70bd53ebf4b360ef3f9a61ece463a20d14d274c1b6603bec2769383160688663300c2258c101fbef3fc3c0ccab2e302087c480bfa8a8b4c27d5e303bfd3a6388af8df3b209d3ffc704c078f52001e7a478dbc763bc6c5297f2498b68eb8d2833430fec30693f8fa413c4c5f5dcbfe7", 0xe1, 0x8}, {&(0x7f0000000500)="33c29a8f1997550cc5b5ceee9e2e0eac02177df917934ea2b3acc2b182bff860219311c5de9c164c3ffc72d656b21112407da59e8410fe49a9c9d491c3bd8b7b07acb2f16c66bbfeb986d70b85e87fbe59c5033f57103d75d58837c0aa5eb9afcd3bea8d556dd5b1c32c5e99c3f373af524c", 0x72, 0x4}, {&(0x7f0000000580)="6e18d1abb3a60a87deb6a0a8ae204bb11e514d687570908327765e674f68e0e6db4a6ec9525f9bf37d3d9afbfd1b634a7557aaf440ba03e97c171b7de3938da53836dc31429f57afeb8fae0692081c1b1995d29ebad51817d37fb8aa0ccfc69966264328acb340718dee51c04d21e7fbf7f130090e6866ba2336e929a2ef8e0a85b56ddfb16cf15d38f6bc860ec6", 0x8e, 0x10001}, {&(0x7f0000000640)="d807ff8bb1eee6068806740c1679a1522787f8f91f07e8676896a6955edef4297ff7a560b5eb0cdc34cd4c5781be96650ca7855193f18c19c875bfe98beb0d19a5e8186af5dae0df85c3a8300d69f4dacfd55968700591352a9b9f92d42829b6bd4e754470874f6ccb97caee9980cd3493a948c0dacb93741942e69053348223e3b4f9f5c14b4832e42efba535ceb1c458c6353ba4", 0x95, 0xf0}], 0x110faaf20808f6f0, &(0x7f0000000800)={[{@force='force'}, {@creator={'creator', 0x3d, "d11162a8"}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'GPL\x00'}}, {@subj_role={'subj_role'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}]}) stat(0x0, 0x0) 03:12:54 executing program 5: ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000440)={0x100, 0x3, 0xfffffffffffffff8, 0x1ff, 0x4}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6a2f5d0023f47bb702415a891b0f018f54f3"], 0x0, 0x12}, 0x20) r2 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0xf5, "b0bdf8086ebbc62bc559bc994d4b67c58e12e059ac19f3c154235dd64b06f85200328013917b88bd32e6cc7d133e1385184cabbd25a95952c14fce2b6b02dc7810034c84804251db449d83d3b5fc10dd79db3b6720e1d6dd669ec0d3ac0c76a7f7570c752e9da62276968871a16dff1724387eafd0ff5ce87b99b13c5779615bef1b1391731f10dee78b0bb0813883cf59292a203445885e472aac08e8f1228f387123514ea659321baf33faabc4e325be5bddcfbe1a4f4949d645768dc226cba15741c5ce8fb3cb0b2e6c621cfc3e72997baff75cd143c23a879d9902dede9b6469119738fccabfc4cd79bbc920f4b7c51741edaf"}, &(0x7f0000000400)=0xfd) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x2, 0x8, 0x9, 0x10000, 0x2a10}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x5) r5 = socket$kcm(0xa, 0x2, 0x73) getsockname(r5, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x80) 03:12:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000500)="afbfc20dcf3bce845d6a8c1d63f1c8daf8238eb5f7f4a9042fe369d230e0528d8ccff9fb24c174b243855a164d86c6b58fb92af86fad13", 0x37, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xb6, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3"}, 0x1ce) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:54 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000000)={@rand_addr, @loopback, 0x0}, &(0x7f0000000100)=0xc) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000080)) epoll_pwait(r3, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f00000002c0)=0x3, 0x4) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x6c, r5, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @loopback}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr="dad3d0fff203ddbfa4108894c39c0dbc"}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x40080) 03:12:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f00000004c0)={0x3, 0x4, {0x0, 0x6, 0x1, {0x0, 0x6}, {0x459, 0x81}, @period={0x5c, 0x9, 0x8, 0x5, 0x35, {0x10000, 0x835, 0x3, 0x5}, 0x4, &(0x7f0000000240)=[0x0, 0x100000000, 0xee, 0x10000]}}, {0x53, 0x2, 0x7, {0xffffffff}, {0xff, 0x4}, @rumble={0xfffffffffffffff8, 0x2}}}) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:55 executing program 5: prctl$PR_MCE_KILL(0x23, 0xb, 0x7fffffffeffe) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x8) prctl$PR_SVE_SET_VL(0x32, 0x243f) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80100, 0x80) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000000c0)={0x9, 0x3, 0x4, 0x4, '\x00', 0x2}) umount2(&(0x7f0000000000)='./file0\x00', 0xe) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000100)={0x1, 0x1, 0x8, 0x100}) socket$inet_udplite(0x2, 0x2, 0x88) close(r1) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000040)={0xfffffffffffffffa, 0x5, 0x9, 0x7fff, 0xfffffffffffffff9, 0x8}) 03:12:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000440), &(0x7f0000000200)}, 0x12e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000200), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x3f, 0x20000) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xd54, {{0x2, 0x4e24, @remote}}, 0x0, 0x6, [{{0x2, 0x4e21, @empty}}, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e24, @broadcast}}]}, 0x390) 03:12:55 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000703000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840000000000000000000000000000000046659a62290ffc380c2db7c75e89e106ba4206274d760dfe0597260617e101000006000000001cb4e2bf501db1bb9427ecd8337f6d63cc8769c29c4d91b00ffff0be48b748d3050bc1700612dbc3080c91125fa158cf0d70309f7f19007c8262d732940142ab1cf90b11e0141c63f5f94035"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x20b) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x3, 0x0, [], [{0x87a4, 0xfffffffffffffbff, 0x5, 0x7f, 0x80, 0x7}, {0xfffffffffffffffb, 0x7, 0x20, 0x5, 0x5, 0xee}], [[], [], []]}) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0xc8) connect$inet6(r0, &(0x7f000053b000), 0x1c) 03:12:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$SG_IO(r2, 0x2285, &(0x7f0000001a00)={0x53, 0xfffffffffffffffd, 0x87, 0x4, @scatter={0x6, 0x0, &(0x7f0000000880)=[{&(0x7f00000004c0)=""/73, 0x49}, {&(0x7f0000000540)=""/213, 0xd5}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000640)=""/33, 0x21}, {&(0x7f0000000680)=""/213, 0xd5}, {&(0x7f0000000780)=""/234, 0xea}]}, &(0x7f0000000900)="e374df24f06232ae02afc309dda1eabd0c45ba1059caa344e3119c49e1b5cbee9cc0901a14422d659dd70483322c1350b708f76ffc6ec0631ed959feb9422041a252432ed193838c324dc68adae4bf123774d0458ef56ffe62fce0403bfe3b50417bc868942a914ba1fe61a61b24b497942371b38d7aec87398846ddfd09627214ce0ef2145d90", &(0x7f00000009c0)=""/4096, 0x1, 0x10, 0xffffffffffffffff, &(0x7f00000019c0)}) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000180001000000000000000000020000170000000006000000000800160004000200080015000600c900"], 0x2c}}, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5f00fe01b2a4a280930206000100000001000000003900090035000c00060000001900154005000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) prlimit64(r2, 0xa, 0x0, &(0x7f0000000280)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x121880, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000002c0)={0x1200000000000, 0x1, 0x7fff, 0x1, 0x100}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$sock_SIOCGIFCONF(r4, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0\x00', @ifru_ivalue=0x456f}}) [ 499.400214] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. [ 499.442041] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. 03:12:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000040)) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/149, 0x95}], 0x1) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x75f, 0x4000) select(0x40, &(0x7f0000000100)={0x6, 0x8, 0xfffffffffffffff9, 0xa992, 0x3, 0x0, 0x2, 0x6}, &(0x7f00000003c0)={0x1, 0x0, 0x9, 0x3, 0x5, 0x800, 0x3e0, 0x7ff}, &(0x7f0000000440)={0x1, 0x7fffffff, 0x2, 0x7, 0x1, 0x4, 0x7ba1, 0x3}, &(0x7f0000000480)={0x0, 0x2710}) writev(r2, &(0x7f0000000340)=[{&(0x7f00000000c0)="b757566630c6af294a8e379367bf204da11a2c4870ee4008cf0ce1726ef91a4b46c0714031c9a079351077dd3888ebfd25", 0x31}, {&(0x7f0000000280)="4b476fb173cd9896e3aba55d41db407731024ae6a69553b2475f1b15f7f14cce71fcbea844e1ec4d2252cc894a4acf1454e186d48f683d6d21a1aa920db23948ccd0d8153d3dedd3aa4edfaf89d095a6655c7c4a02b9bb39818eb58d0a895c068c4ce2e9979f870564b0a222", 0x6c}], 0x2) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000200)={[0x4000, 0x2, 0x100000, 0x3000], 0x8, 0x2, 0x9}) write$UHID_DESTROY(r3, &(0x7f00000004c0), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 03:12:55 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0xc02b, 0x80000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) socket$bt_rfcomm(0x1f, 0x1, 0x3) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) write$FUSE_BMAP(r0, &(0x7f0000000240)={0x18, 0x0, 0x4, {0x100000000}}, 0x18) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x800) write$FUSE_DIRENT(r0, &(0x7f00000000c0)={0x48, 0x0, 0x5, [{0x4, 0x10001, 0x2, 0x9, '#\\'}, {0x4, 0xfffffffffffffffb, 0x0, 0x6}]}, 0x48) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x1f, 0x301f, 0xf, 0x6, 0x4, 0x3, 0x1}}) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f0000000440), 0x400000000000211, 0x810) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) [ 499.714561] device nr0 entered promiscuous mode 03:12:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xb6, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3"}, 0x1ce) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000500)=""/4096, 0x1000) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x800) write$FUSE_DIRENT(r0, &(0x7f00000000c0)={0x48, 0x0, 0x5, [{0x4, 0x10001, 0x2, 0x9, '#\\'}, {0x4, 0xfffffffffffffffb, 0x0, 0x6}]}, 0x48) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x1f, 0x301f, 0xf, 0x6, 0x4, 0x3, 0x1}}) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f0000000440), 0x400000000000211, 0x810) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) 03:12:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000040)) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/149, 0x95}], 0x1) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x75f, 0x4000) select(0x40, &(0x7f0000000100)={0x6, 0x8, 0xfffffffffffffff9, 0xa992, 0x3, 0x0, 0x2, 0x6}, &(0x7f00000003c0)={0x1, 0x0, 0x9, 0x3, 0x5, 0x800, 0x3e0, 0x7ff}, &(0x7f0000000440)={0x1, 0x7fffffff, 0x2, 0x7, 0x1, 0x4, 0x7ba1, 0x3}, &(0x7f0000000480)={0x0, 0x2710}) writev(r2, &(0x7f0000000340)=[{&(0x7f00000000c0)="b757566630c6af294a8e379367bf204da11a2c4870ee4008cf0ce1726ef91a4b46c0714031c9a079351077dd3888ebfd25", 0x31}, {&(0x7f0000000280)="4b476fb173cd9896e3aba55d41db407731024ae6a69553b2475f1b15f7f14cce71fcbea844e1ec4d2252cc894a4acf1454e186d48f683d6d21a1aa920db23948ccd0d8153d3dedd3aa4edfaf89d095a6655c7c4a02b9bb39818eb58d0a895c068c4ce2e9979f870564b0a222", 0x6c}], 0x2) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000200)={[0x4000, 0x2, 0x100000, 0x3000], 0x8, 0x2, 0x9}) write$UHID_DESTROY(r3, &(0x7f00000004c0), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 03:12:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000240)=0xfffffffffffffcb6) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000002c0)={0x0, r1}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$BLKRRPART(r2, 0x125f, 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 500.096607] device nr0 entered promiscuous mode 03:12:56 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xfffffffffffffffc, 0x204) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={0x0, 0xfffffffffffffe24}) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) accept$inet6(r0, 0x0, &(0x7f00000000c0)) getsockname$llc(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x10) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) stat(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x5, 0x0, &(0x7f00000002c0), 0xfeb98424bd265df9, &(0x7f0000000500)={[{@nossd='nossd'}, {@nospace_cache='nospace_cache'}, {@commit={'commit', 0x3d, 0x1}}, {@flushoncommit='flushoncommit'}, {@ssd='ssd'}, {@inode_cache='inode_cache'}, {@check_int='check_int'}, {@usebackuproot='usebackuproot'}, {@check_int='check_int'}, {@inode_cache='inode_cache'}], [{@permit_directio='permit_directio'}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}, {@appraise='appraise'}, {@context={'context', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', r3}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@permit_directio='permit_directio'}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x105400, 0x0) 03:12:56 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0xd17, 0x200000) recvmsg$kcm(r0, &(0x7f00000009c0)={&(0x7f00000004c0)=@nl, 0x80, &(0x7f0000000940)=[{&(0x7f0000000540)=""/23, 0x17}, {&(0x7f0000000580)=""/243, 0xf3}, {&(0x7f0000000680)=""/95, 0x5f}, {&(0x7f0000000700)=""/192, 0xc0}, {&(0x7f00000007c0)=""/218, 0xda}, {&(0x7f00000008c0)=""/99, 0x63}], 0x6}, 0x974604d144c99ee7) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:56 executing program 5: add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000000)={'.\x00'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) 03:12:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000900)=0xa3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000880)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) renameat(r1, &(0x7f0000000240)='./file0\x00', r0, &(0x7f00000004c0)='.\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) syz_mount_image$nfs(&(0x7f0000000500)='nfs\x00', &(0x7f0000000540)='./file0\x00', 0x2, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000580)="0cce82fe265f301cfe102b33dfebc23a3517e8ebee8cf216fca1192a43b12aa4f60cfc33a0b97becb5c6bc584452556879f807ab634a91e81b3ab976f142e9db7cb0c5985648efad229a1f5efd4641c4d88faecb4892cd38795587e94716fb351bb6f72507323c53c60ed276932100ab5e8986eaa13ac9f0358d28fa405a4bde6a21e5", 0x83, 0x8}, {&(0x7f0000000640)="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", 0xfd, 0x7}, {&(0x7f0000000740)="c49ba97b4339bb7c18a1fe8f09905429cd5dc624288532d8fcd877b82fcb1572be06072370454e119126df5d489824895bdee4eb2fd31b6582e99a95795b9042c2aa58dd697b88885560e8316f53c7e182b318c7db120b99619fadc1675875749bc08a00441cb8fc37d42dca1ece9c", 0x6f}], 0x200000, &(0x7f0000000840)='+\xabeth1\\&&cpuset\'\x00') shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:56 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r3, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000000040), 0x0) fcntl$setstatus(r0, 0x4, 0x42400) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000100)=0x1, 0x4) accept4$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x10, 0x800) sendto$packet(r0, &(0x7f00000002c0)="b909e25b2f6670acab86b879fc2cbf82b524a1ccf142a2c89aa6ac5181d1e12f8de9477c053e7dbfec6f9e9c57bc3ee303978898efe1184d6b5eb9aac595fd9919f64a55d797b93dc2d5386ebb4d4a4790d2f223073b8452ff15bbae3de281c53c8dc40c97ebbed0fbf8bb7d62a755b0095c105029b49d61fb9979ebb02b34b12f98234414ee6ac6d17630d7ecc4d8ed4a9997f2916cf92bd87695a77c00acc161c615f4cf165a1956cf8bf875f43a206ac3d4e7d711e56d443579f0629e7dd22fcc77b96ef0fb5205bb99ec72107e1fd0", 0xffffffffffffff25, 0x20010004, 0x0, 0x24b) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) 03:12:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xb6, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3"}, 0x1ce) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:56 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x2000000000407e) io_setup(0x8, &(0x7f0000000100)=0x0) r2 = getpgrp(0xffffffffffffffff) getpgrp(r2) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 03:12:56 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000ffb000/0x1000)=nil, 0x1000}}) connect$ax25(r1, &(0x7f00000002c0)={{0x3, @default}, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x34, 0x0, 0xe00, 0x0, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1c, 0x7, @l2={'ib', 0x3a, 'erspan0\x00'}}}}}, 0x34}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x4) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) r3 = fanotify_init(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fanotify_mark(r3, 0xd, 0x48000028, r0, 0x0) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) close(r5) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) 03:12:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:56 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739eb6ef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) fchdir(r0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000500), &(0x7f0000000580)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec]n\x81\x13\x13\xef\x86\t%3\x05V\x82Z\xdc\"A\x81y\xef\'\xe8\x81K\x03;\fg\\M\xbe\xe0\x92\xc6\xa9d\xb2J\xc6\xca>\xe7w\x8c\xc8\xdbe\xcd\x11q+j\xce\x01r\xf1\xfa\a\x1f\xd6\x1cu>@\x1c\xe4\xc6\xfd\x10+\x18\x05Z\xda', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/dlm-monitor\x00', 0x2000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1, 0x8, 0xff}}, 0x30) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) poll(&(0x7f0000000900)=[{r0, 0x40}, {r2, 0x1000}, {r0, 0x18}], 0x3, 0x5) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x200000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030311e30780b1f274e8856f95f69643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,allow_other,blksize=0x0000000000000200,blksize=0x0000000000000800,max_read=0x0000000000000d1d,blksize=0x0000000000001000,uid<', @ANYRESDEC=r4, @ANYBLOB=',fsmagic=0x0000000000000015,\x00']) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r5, 0x9204, 0x8a688) fcntl$notify(r0, 0x402, 0x8) exit(0x0) write$char_usb(r0, &(0x7f00000007c0)="0e70225ca57bfacba4cb62e5a167badc0274214bfa5b68aae7eb73ae125f74a66ee3d7fa0c5a157f64affa30c0c2b012a88715fc3c9b130085003282a8a9263ed442b635fc32eba2e1ffab508aed61101d7a97868ac7e02983824b71661751d921853dd0647bc629eb76688b5fc4c7730806fc7eaa9ead75d8495b7cc79978afd7b5a8908a30ac25c15ced31a6baa0257c03f6e48a9c31eb450f3ff77107c2e92149f3f149fc94fa1eb891d5a1701db61f9547acd62a83ef8ebaaacaac1eb1144693871c2a67927d2eb391701d25330f5b15b57eb1ae8c5e61c6d1a8", 0xdc) fchown(r5, 0x0, 0x0) 03:12:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:57 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) r4 = getuid() fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir\t./file0,lowerdir=./file0,workdir=./file1\\\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) syz_mount_image$minix(0x0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f00000003c0)="b48483c442ce32b22ccec89d4821990c856f3db51781503037f0acfd57f3ae1b", 0x20}], 0x200000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000140)={0x1, 0x0, {0x2, 0x5, 0x0, 0x1000}}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x0) sysfs$2(0x2, 0xc000000000, &(0x7f00000001c0)=""/96) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:12:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x2040, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0xb, &(0x7f0000000340)=0x3, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$MON_IOCX_GETX(r3, 0x4018920a, &(0x7f0000000040)={&(0x7f0000000000), &(0x7f00000000c0)=""/88, 0x58}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$sndseq(r2, &(0x7f00000001c0)=[{0x1, 0xfffffffffffffffa, 0x0, 0x80000001, @time={r4, r5+10000000}, {0x41, 0x100000000}, {0x1, 0x44}, @connect={{0x20, 0x7}, {0xe97, 0xffffffffffffff01}}}, {0x6, 0x2, 0x3, 0x0, @time, {0x5}, {0x0, 0x3}, @raw32={[0x7fffffff, 0x80000001, 0x209]}}, {0xffffffffffff74f3, 0x40, 0x2, 0x2, @tick=0x36, {0xfffffffffffffff7, 0x2f}, {0x4, 0x7}, @raw32={[0x8, 0x2, 0x80000000]}}], 0x90) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000140)={0x1, 0x7}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x491, [0x277, 0xa00d0000], [0xc1]}) 03:12:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000240)={0x3, 0x9}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xc3, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379"}, 0x1db) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83c1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b0000"], 0x1e7) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000240)={'bond0\x00', {0x2, 0x4e23, @multicast1}}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0xfffffffffffffff9, 0x7fffffff, 0x1000, 0xfff, 0x5, 0x19c5400000, 0x10000, 0x9]}) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:12:57 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000004c0)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r1, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000580)={&(0x7f0000000640)=ANY=[@ANYBLOB="2c000000250001042dbd7000fddbdf2500000000762dfa92607f87ecd97b87be7e29fab28825f227645440e4ad197d1bdb2695c2531c5ec0e866b817ead1195a413029c925ec7c6f659955e14640c758a2aa1e16fd380ec5bb11e93b0d4b8329f402f8b0100a37187fbd1a1ca79cf4199a81bf29265a9eb81299996668", @ANYRES32=r3, @ANYBLOB="0d0009000e000d000a00ffff08000d00c6000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x1024, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000600)) 03:12:57 executing program 3: getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000007f00d15ca837dd4698bcbc6e003498915b1b563dfc0904bf68e63e2aab2b0fcda331cde480034db273f24af502660c21e2f0b0d46cedbe191678aa5e5f429f87db079f033d14a5936370f1ac4e3fbc3a4b91aa3d01fabad35456573903488b590a0e80b303453eb855b60e097f9304d3b3a574449ef4471f936ef6ab5ec30500000048e1bbee9edb608f13797e3bae7110543523dbb1266a80a700e6d856d1000000ed561ab25550d07b159edddf786dc07e0f3762e7d7ac643386ab70dd1cab63b14bb6bf53a5be78dc5670a9c1ab0d64ec1f8632430a3cdf1f36680c6ead9d71b6f64bb53c98c9e235a2bd75f1e4087c71d8dc014dea942aca1d69d926d77e1b3da14cccb710e1c5310c6bcece00"], 0x0) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0}, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000380)) 03:12:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737731e7046e7f33a2e0af9e9629ebeef2170d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0d3139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b5864197a9812ce22fe98a1d2efa2297b77caa71078b9bbee9469b367bc95f543400ee7c420a1c62da8d00d068f3ac03ea0c18bb35ee63636c6bec0c32750a6afb3b020fafa8628fec870a8fcd1df6218f3"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:58 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) shutdown(r0, 0x0) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000140)=""/228) recvmmsg(r0, &(0x7f0000002c00)=[{{&(0x7f0000001900)=@nfc_llcp, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000002ac0)=""/40}, 0x80000001}, {{0x0, 0x0, &(0x7f0000002bc0)=[{&(0x7f0000002b00)=""/150}]}, 0x5}], 0xc2, 0x12000, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:var_log_t:s0\x00', 0x1f, 0x2) 03:12:58 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f1d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:58 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000480)=""/5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000200)={0x30000000}) r1 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000600)="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", 0x1000) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000001600)={0x4, {{0x2, 0x4e24, @broadcast}}, 0x0, 0x4, [{{0x2, 0x4e21}}, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e22}}, {{0x2, 0x4e24, @empty}}]}, 0x290) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000005c80)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000005cc0)={0x12, 0x10, 0xfa00, {0x0, r4, r3}}, 0x18) getsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000240)=""/94, &(0x7f00000002c0)=0x5e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2e565d7c36d98a1, 0x0) socket$netlink(0x10, 0x3, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000018c0)={0x14, 0x88, 0xfa00, {r4, 0x1c, 0x0, @in={0x2, 0x4e20, @multicast2}}}, 0x90) fcntl$getownex(r2, 0x10, &(0x7f0000000380)={0x0, 0x0}) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x1, 0x80, 0x6, 0x0, 0x0, 0xbd, 0x0, 0x8, 0x1, 0x2, 0x5, 0x5, 0x6, 0x1, 0x8, 0x100000000, 0x80000001, 0x1ff, 0x2, 0x0, 0x1ff, 0xb4b, 0x400, 0xfffffffffffffff9, 0x9, 0x2a75, 0x5, 0x4, 0x4ee1, 0x2, 0x4, 0xb98, 0x8, 0x0, 0x4c76, 0x9, 0x0, 0x3, 0x4, @perf_config_ext={0x401, 0x6}, 0x800, 0x863, 0x800000000, 0x3, 0x8, 0x4000000000, 0x7}, r5, 0xe, r0, 0x1) 03:12:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xc3, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379"}, 0x1db) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:12:58 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000640)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0)={0x0, 0x0}, &(0x7f0000000d00)=0xc) write$P9_RSTATu(r0, &(0x7f0000000d40)={0x8c, 0x7d, 0x1, {{0x0, 0x6a, 0x80000001, 0x6, {0x0, 0x1, 0x2}, 0x200000, 0x2, 0xc, 0xfffffffffffff000, 0x17, 'posix_acl_access%system', 0x0, '', 0x5, 'syz0\x00', 0x1b, 'userem1\x9eem1.{cgroup!wlan1)!'}, 0xd, '/dev/urandom\x00', r1, r2, r3}}, 0x8c) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_security(0x11, r5, &(0x7f0000000500)=""/193, 0xc1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, 0x0, &(0x7f00000006c0)=0x359) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r6, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r8 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x800, 0x0) write$binfmt_elf32(r8, &(0x7f0000000700)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x80, 0x4, 0x1f, 0x0, 0xa51104bc2c8f6cfa, 0x3, 0x7fffffff, 0x207, 0x38, 0x28e, 0xfff0000000, 0x5, 0x20, 0x2, 0x2, 0x20, 0x7}, [{0x2, 0x0, 0x8, 0x6, 0xcb9d, 0x2, 0x9, 0x431}, {0x1, 0x4, 0x5, 0x6, 0x401, 0x29a, 0x400}], "628b90da8873f9eccc6afd0fea365a4da17d7a2947e459f0e1861318c66a7e328fe0498f536b4b83fc76383c4367c8b500cb1d6215577509138ce19db95c7f8a422937e69fc35e085aec5318d17b3f1729f06a634ab2c8730873fb", [[], [], []]}, 0x3d3) ioctl$NBD_DO_IT(r6, 0xab03) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$IOC_PR_PREEMPT(r6, 0x401870cb, &(0x7f0000000280)={0x4000000000000000, 0x80000001, 0x1000, 0x8}) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 503.911023] Bluetooth: hci0 command 0x1003 tx timeout [ 503.916591] Bluetooth: hci0 sending frame failed (-49) [ 505.990102] Bluetooth: hci0 command 0x1001 tx timeout [ 505.996007] Bluetooth: hci0 sending frame failed (-49) [ 508.070250] Bluetooth: hci0 command 0x1009 tx timeout 03:13:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0xfffffffffffffff9, 0x7fffffff, 0x1000, 0xfff, 0x5, 0x19c5400000, 0x10000, 0x9]}) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:13:08 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) set_robust_list(&(0x7f0000000280)={&(0x7f0000000140)={&(0x7f0000000040)}, 0x811e, &(0x7f0000000200)}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) bpf$MAP_CREATE(0x0, &(0x7f0000000340), 0x2c) r1 = socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r0, 0x0, 0x20) sendmsg$kcm(0xffffffffffffff9c, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000680)}, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) getpid() gettid() socket$kcm(0xa, 0x0, 0x11) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) 03:13:08 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:08 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000740)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000003c0)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0), r5, 0x0, 0x2, 0x4}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x9, 0x882, 0x9, 0x27c}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r6, @in={{0x2, 0x4e21, @rand_addr=0x6}}, 0x800, 0x9}, &(0x7f0000000080)=0x90) fcntl$setstatus(r4, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r4, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000003c0)=ANY=[@ANYBLOB]) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) 03:13:08 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xc3, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379"}, 0x1db) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:08 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockname$netlink(r1, &(0x7f0000000640), &(0x7f0000000680)=0xc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000100}, 0xc, &(0x7f00000005c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="b1bf00000000fd3324d81c302fb32c57a27b20a2fa305c8d989a0a82263271d16942ff0334b7c032b2652791ed1c05dc7dbe1581ed87c1c13b8a874770e5e0028aa7ec1a66d55028401bb6c7", @ANYRES16=r3, @ANYBLOB="00002dbd7000fcdbdf25050000000c00010008000b00736970000c000200080004000000000008000400000200003800010008000b007369700008000b0073697000080009002f00000008000b00736970000c0007000800000010000000080004004e2000003c00010008000b00736970000800080004000000080004004e21000008000100020000000800090055000000080008008801000008000800020000000800050005000000"], 0xb0}, 0x1, 0x0, 0x0, 0x40080}, 0x81) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:08 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:08 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x5651df4c83394922) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x3, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:08 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20ncci\x00', 0xa0080, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000780)={0x0, 0x9c, "65938caf0b93d84a33dfa6407120e80ea28869c75b342f81b333f24ef57cc64b8cb67a8222f96ab92374803aec1edadd5c19bf2282d24c6fcfc07549e08204f39dd495e91b02e626e2f12378a94b62007a81a9ae54c0343b22f80080616da61524a3af229ebaf11063110873c9c0afe83003f9fb83719512c70835a67ae0c5f703826f3cadc93485f869a630da395dc09f689ee31f808c287963c2b0"}, &(0x7f0000000840)=0xa4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000880)={r1, 0x83, "7dfdf6b9a407ee6f66e70e3720037e67643e3daba8d4d88ce412000429638ea4572430ad891a24c4292e05f0707e6a1de3c968f4b9c8ff0321b56c46c3fb3790c817fbba79a617b86a0c68cc4d09b10043253ee401b7230a91dc4ad410ba1156feaf2d415b01f773ee14a9760486c98ae5f06a9bbf48294f0ee49420fc869249ccd191"}, &(0x7f0000000940)=0x8b) r2 = socket(0x10, 0x1, 0x2) recvmsg(r2, &(0x7f0000000700)={&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/208, 0xd0}, {&(0x7f0000000000)=""/12, 0xc}, {&(0x7f00000002c0)=""/52, 0x34}], 0x3, &(0x7f0000000600)=""/239, 0xef}, 0x40000000) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:13:08 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x101000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000004c0)={0x2, 'netdevsim0\x00', 0x1}, 0x18) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000640)={0xa, 0x3, 0x4}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') fanotify_init(0x10, 0x101000) write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x30, r4, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9e9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x3036e0e9e8639cb4}, 0x8090f77ebc62341) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x4) [ 514.550106] Bluetooth: hci0 command 0x1003 tx timeout [ 514.556167] Bluetooth: hci0 sending frame failed (-49) [ 516.630117] Bluetooth: hci0 command 0x1001 tx timeout [ 516.635413] Bluetooth: hci0 sending frame failed (-49) [ 518.710233] Bluetooth: hci0 command 0x1009 tx timeout 03:13:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0xfffffffffffffff9, 0x7fffffff, 0x1000, 0xfff, 0x5, 0x19c5400000, 0x10000, 0x9]}) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:13:18 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x4040, 0x0) write$uinput_user_dev(r0, &(0x7f0000000800)={'syz0\x00', {0x4010, 0xff, 0x2, 0xdb1}, 0x47, [0xffffffffffffffe6, 0x0, 0x4, 0x9, 0x40, 0x0, 0x7, 0xfffffffffffffffe, 0x3, 0x74, 0x100, 0x9, 0x40, 0x3, 0x9, 0xffffffff, 0x2, 0x4, 0x1ff, 0xf134, 0x52, 0x600000000000, 0x2c, 0x117a, 0xd7, 0x4, 0x6, 0x51432a6c, 0x6acd, 0xa, 0x95, 0x0, 0x7fff, 0x8000, 0x1ff, 0x2, 0x6, 0x7d2, 0xfffffffffffffff7, 0x3ff, 0x9, 0x1000, 0x7ff, 0x400, 0x40000000, 0x4, 0x800, 0x8001, 0x8, 0x4, 0xfffffffffffffffe, 0x6, 0x4, 0x3, 0xa00000000, 0x8, 0x6, 0x4, 0x355c, 0x6, 0x1, 0xffffffff, 0x1], [0x5, 0x1f, 0x0, 0x5, 0xb5, 0x80000000, 0x51be, 0x100000000, 0x100000001, 0xfffffffffffffffe, 0x4, 0xc8, 0x8, 0xffffffffffffffff, 0x10000, 0x2, 0x800, 0x4, 0x516ab92d, 0x9, 0x7, 0x20, 0x1, 0x6, 0x58, 0x4, 0xfff, 0x35d, 0xffff, 0x5, 0x7, 0x7f, 0x7, 0xfffffffffffffff9, 0x4, 0xff, 0x1, 0x10001, 0x8, 0x6, 0x3, 0x0, 0xfffffffffffffff9, 0x7ff, 0x75, 0x101, 0x8a, 0x68, 0x0, 0xffffffffffff820f, 0xc0000000, 0xffff, 0x1, 0x0, 0x3, 0x0, 0x8, 0x6, 0x8, 0x59, 0xffffffff00000000, 0x8, 0x8001, 0x26], [0x6, 0x3, 0x200, 0xfffffffffffffffa, 0x5, 0xffff, 0x8, 0xa, 0x7, 0x22f0, 0x7, 0x3, 0x3f, 0x0, 0x81, 0x2e, 0x1, 0x6a3, 0x3, 0x1, 0x8001, 0x0, 0x400, 0x8, 0x9, 0x1e, 0x33ce, 0x100000001, 0x9, 0xd3c5, 0x20, 0x0, 0x3, 0x73e, 0x30, 0x2c1, 0x7fff, 0x0, 0x43, 0x3, 0x8, 0x7ff, 0x80000001, 0x8001, 0x7, 0x10001, 0x1, 0x3, 0x28, 0x81, 0x2, 0xff, 0x1, 0x44f40946, 0x2, 0x3f, 0x4, 0x766, 0x20, 0x10000, 0x3, 0x8, 0x6, 0x9], [0x5, 0xfffffffffffffffa, 0x6, 0x4a8, 0x2, 0x0, 0x0, 0x100, 0x3, 0xffff, 0x101, 0xfff, 0x4, 0x2, 0x6fee08ee, 0x5, 0x2, 0xfffffffffffffffb, 0x20, 0x0, 0x20, 0x3, 0x5, 0x20, 0x2, 0x9, 0x7f, 0x7, 0xfff, 0x100000001, 0x8, 0x2, 0x6, 0x1f, 0xc5e, 0xffff, 0x7, 0x7, 0x2, 0x60, 0xfffffffffffffffb, 0x0, 0x9, 0xca, 0x8, 0x5, 0x10001, 0x1, 0x4, 0x3, 0xffffffff9d2dae14, 0xc04, 0x5, 0x8, 0xfc4, 0x0, 0x400, 0xd7, 0xffff, 0x9, 0x4, 0x3, 0x0, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x10000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x800, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000200)) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000080)=0x40) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x1000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}, 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x800002, 0x100010, r3, 0x0) readv(r2, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x12de}], 0x30e) 03:13:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000540)) write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a30000000000000000000001178196a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786842ac88778871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba78415113dfadfdc83e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)) accept$packet(r1, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x13, 0x3ff, 0x7, 0x7fff, 0xe1, r1, 0x800, [], r3, 0xffffffffffffffff, 0x2}, 0x3c) r4 = shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) connect$vsock_dgram(r1, &(0x7f0000000580)={0x28, 0x0, 0x0, @reserved}, 0x10) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000500)={@empty, 0x57, r5}) shmctl$SHM_UNLOCK(r4, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:18 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xc9, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1c"}, 0x1e1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:18 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f00000001c0)='\x89-\x00', 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) unshare(0x40000000) ioctl$KDMKTONE(r1, 0x4b30, 0x3) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$inet(0x2b, 0x0, 0x3f) sendmsg$NBD_CMD_RECONFIGURE(r1, 0x0, 0x45) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x10001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r4, 0x3, 0x2f06}, 0xc) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=r4, @ANYBLOB="ab000000094ed6db00006edee092d7dca0b849999516aea1aa2ee6ea2ed28a3886bb12851e387204034db91b9893f05ed2d863218312d087b27e5e5fd1118f6dc1aaedd8831d300a6e7cea450fb15bcd88172d82f90c6b841b19715b1aaa699a00ed9afa55611de7da57421f36cfccef98146134eb1a67b301e1c68b1e64446677129bacc28a6c0d7dca0b2d09e6d4fac34f2a1ca50d86d51863c9426205a86d959b13f5e4eda8f23af465666b5c9103efcd9c3cddcf7d5543f07a7f8ddb40efd52e3c10c055a399d65eff65b285b358e73bcc977b5f2d1c5ab5a20a8d43e097387918e9ee8268"], &(0x7f0000000340)=0xb3) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f00000000c0)={0x1, 0x0, 0x100, 0x2, {0xffffffff, 0x0, 0x4, 0x9}}) flock(r3, 0x4) [ 522.771187] audit: type=1400 audit(1565665998.622:105): avc: denied { map } for pid=20056 comm="syz-executor.2" path="pipe:[67772]" dev="pipefs" ino=67772 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 03:13:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000004c0)=@req3={0x32ab, 0x8, 0x9, 0x870a, 0x40, 0x5, 0x800}, 0x1c) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = getpgrp(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="0b00000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008c797a30000000000000000000000000000000000000000000000000000000000000000000000000001170f3ba0202aef5d208a54cf52045ad000000000000000000000073797a300000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000048cc341d9ec017e800cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035aa1d3718d7c78c6c9a86b1c4bf1a501c12cc9aa2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da5892c2538a628ceae01cff9e0e782c2b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b0000000000000000004b87d6af448ed3abea92f6f7cf0b5b54cd341480ffffffffcffc4b5b73d92df0f7cd3e367504173d7169e93b49b3d48d3f4bcd6ee38608eb12a4d89d651fcb4b52d3f8538ea1c1edc7b94557ed690dd5217870a15f34ac294e9538211c908f9dea629e3b999fbd2bf1eec81ed81700b2562aec8557846b6b3b84167ddc1a631d1d080425fb9e00000000"], 0x1e7) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) sysfs$3(0x3) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) 03:13:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xc9, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1c"}, 0x1e1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 522.996011] IPVS: ftp: loaded support on port[0] = 21 03:13:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 524.880097] Bluetooth: hci0 command 0x1003 tx timeout [ 524.885393] Bluetooth: hci0 sending frame failed (-49) [ 526.950186] Bluetooth: hci0 command 0x1001 tx timeout [ 526.955479] Bluetooth: hci0 sending frame failed (-49) [ 529.030300] Bluetooth: hci0 command 0x1009 tx timeout 03:13:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0xfffffffffffffff9, 0x7fffffff, 0x1000, 0xfff, 0x5, 0x19c5400000, 0x10000, 0x9]}) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:13:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:28 executing program 2: 03:13:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000b600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xc9, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1c"}, 0x1e1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:28 executing program 3: 03:13:28 executing program 2: 03:13:28 executing program 3: 03:13:28 executing program 2: 03:13:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) getresuid(&(0x7f0000000240), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) setuid(r2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:28 executing program 3: 03:13:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000001340)="13", 0x1, 0x0, 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup3(r1, r0, 0x0) [ 535.030099] Bluetooth: hci0 command 0x1003 tx timeout [ 535.035912] Bluetooth: hci0 sending frame failed (-49) [ 537.110130] Bluetooth: hci0 command 0x1001 tx timeout [ 537.115646] Bluetooth: hci0 sending frame failed (-49) [ 539.190100] Bluetooth: hci0 command 0x1009 tx timeout 03:13:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0xfffffffffffffff9, 0x7fffffff, 0x1000, 0xfff, 0x5, 0x19c5400000, 0x10000, 0x9]}) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:13:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000380)) 03:13:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000004c0)=0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002ffd068b010400000800000000800000b6030000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netstat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 03:13:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0xfffffffffffffff9, 0x7fffffff, 0x1000, 0xfff, 0x5, 0x19c5400000, 0x10000, 0x9]}) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:13:39 executing program 2: openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x200, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind$isdn(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00'}) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]}}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) getpgid(0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 03:13:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x20000000000af06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x42b) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0xfffffffffffffff9, 0x7fffffff, 0x1000, 0xfff, 0x5, 0x19c5400000, 0x10000, 0x9]}) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:13:39 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, &(0x7f0000000440), 0xc) 03:13:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:13:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shutdown(r1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000005c0)={r0, r0, 0x5, 0xf4, &(0x7f00000004c0)="bad0c333dd77c76d70c8ffc49222414f8f9bf6ed33011d108550c152dd37bc845ced1e012bca03391cd3c6808e310e53e54ae770cf985c4fa60de0c2256969f6a02bd049965ae66fdcc3ce7204d8f134cb37a3290402b1b11fa6e478e583e457433e5f73b4892026d16e4b35811b10aea26c91a6838dd5425958842afe5e971dc944121b2e539f967f022fd9895118ccaffaf6cb995c214179b9e55489ae78aa54d8eacc745a1ddb9e790844759af3d8359b80ec281d6d7d31dcf7d906160fa39008a22c9d1c743e0e76def3dd24f7c1ab179cc24db3242141c226a41610cf1eefd440aeb819e11f5da3420a0e84cce33c2e30a8", 0x7, 0x1, 0x1, 0x7, 0x49535ddb, 0x1, 0x3f, 'syz0\x00'}) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 3: shmctl$IPC_SET(0x0, 0x1, &(0x7f00000004c0)) 03:13:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x1b3, &(0x7f0000000000)=[{&(0x7f0000000080)="230000002000ffae00060c00000f000a02000000810000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 03:13:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 543.718015] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 03:13:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x400000, 0x0) r1 = fcntl$getown(r0, 0x9) migrate_pages(r1, 0x5, &(0x7f0000000240)=0x7fffffff, &(0x7f00000004c0)=0x2cd) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000500)={'nat\x00'}, &(0x7f0000000580)=0x54) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) 03:13:39 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="d3d2b93c38009c044dcd8034cf7df91d6c"], 0x10}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) fcntl$setownex(r1, 0xf, &(0x7f0000000140)={0x0, r0}) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="c002", @ANYBLOB="000429bd7000fddbdf251600000024000600040002000800010001f0ffff040002000800010000040000080001000200000048000700080001000000000008000100060000000800020002000000080001000100010008000100ffffff7f0c000400f7ffffffffffffff080001003f0000000800020009000000"], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 03:13:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x200}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000500)={r3, 0x8cea}, &(0x7f0000000540)=0x8) [ 543.927261] ptrace attach of "/root/syz-executor.2"[20210] was attempted by "/root/syz-executor.2"[20212] [ 545.670162] Bluetooth: hci0 command 0x1003 tx timeout [ 545.675451] Bluetooth: hci0 sending frame failed (-49) [ 547.750194] Bluetooth: hci0 command 0x1001 tx timeout [ 547.756774] Bluetooth: hci0 sending frame failed (-49) [ 549.830237] Bluetooth: hci0 command 0x1009 tx timeout 03:13:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:13:49 executing program 3: eventfd2(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000140)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x20000005, &(0x7f00000003c0)=0x5, 0x3a8) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xa260e6ad6f4a934b) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000400)) sendmmsg(r0, &(0x7f0000000880), 0x37b, 0x8000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000005c0)=0xff, 0x4) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001240)=ANY=[@ANYBLOB]}}, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x1fb) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, &(0x7f0000000700)) ftruncate(r6, 0x2007fff) sendfile(r4, r6, 0x0, 0x8000fffffffe) 03:13:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="6d656e675e6500000000000000000000ff071b526bb5950000000000000000000000000000001f00000006000000a005000058024fdf80a3306e074fd9ab0d8d50d93c7d71c54c000000d87bb297a2cf0000e8070000e805"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:13:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000240)={0x3e, 0x4004400}) 03:13:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da09928fec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16bc16c84c330a4638173fe16885b03eafc6405d3538833d58341dea296fc1dcd526bd351f1d44e2a3bcfd56e318641bb7423455452bacab19b362bf2b0144b25c753d2c12e61788a9bb948f139eac20190fec62d130cc4b52c879c59264ed091d7bcae812b2251d44d78a745ac8da505ea2235d819a9178495cbcd4c1d96bd46383cf48e408b17578a7a16753380f71bb2d057be13046630e9cb77770976918d496026a289416a25a55d9ad578f35ffb7f93f200"/665], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000004c0)=0xfbe585b61abfa49b) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r1, r3, r4) [ 554.183486] ptrace attach of "/root/syz-executor.2"[20245] was attempted by "/root/syz-executor.2"[20246] 03:13:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') socket$bt_cmtp(0x1f, 0x3, 0x5) write$UHID_CREATE2(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b2525c2caaaec1d972db83170188ead30564b7d5d12e3de416eb49dbaf67b4e22f80c54f45f0c3edebeb8a712e24e2e96b68c637178ea2e094c593549e81d130571ee1eaf"], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x80) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f00000004c0)={0x0, 0x4006400}) 03:13:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') syncfs(r0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@empty, 0x5a, r2}) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) pivot_root(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00') bind$isdn(r3, &(0x7f0000000240)={0x22, 0x0, 0x8, 0xc49, 0x709}, 0x6) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000004c0)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:13:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) connect$pptp(r1, &(0x7f0000000240)={0x18, 0x2, {0x2, @local}}, 0x1e) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 556.230123] Bluetooth: hci0 command 0x1003 tx timeout [ 556.235430] Bluetooth: hci0 sending frame failed (-49) [ 558.310138] Bluetooth: hci0 command 0x1001 tx timeout [ 558.315458] Bluetooth: hci0 sending frame failed (-49) [ 560.390282] Bluetooth: hci0 command 0x1009 tx timeout 03:14:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:00 executing program 2: pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000600)=""/164) close(r1) flock(r0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) clone(0x0, &(0x7f0000000140)="b30b488b8d030ab103b38ba2b3c644e1e22aafa3404e6e091f17a9d5690ca8195c780f21b8cc8d044454ec970cdcf4345d8f99b6e6a34c2c48761c48bb752811890e9f2d0e02d021d6b30e79540e616d0008e6ce1f", 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000005c0)={'veth1\x00', 0x200000005002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2007fff) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x4040, 0x0) timerfd_gettime(r4, &(0x7f0000000480)) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000400)={'erspan0\x00', {0x2, 0x4e20, @remote}}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fadvise64(0xffffffffffffffff, 0x0, 0x7, 0x4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/policy\x00', 0x0, 0x0) write(r6, &(0x7f0000000900)="8b8fdbb658682c7fca443fa359d42e25055ade3bcc14be68beb9f32dd0caeaffb469377c94baa750964532866f89c55bf9acb42c39d264df9b6bd8ab5356e3d44aa65eebd3f6e2da2c0048acf3764c9f24b7a5f980fd2565ab87ac9ec5aafb30f1c4b3b1330e03e0b554b8573d227cf62f21c933fa90199bb51bf8f9851b5d9362de983a0c97634864d1fa66c627bb95f6a23f15cc79156e0b11c3d546446601e097450f4df31cab00ce352e2a6d7113337e9b4992b8a5afc0954b75f8dce7ee5e383863edf1e3c588825dd48612eb2402c7f30afe8df2cdae8d9e9411ca117ca10c40df6e97c65bcfc642869b5a71b4acf91ee4b44bf1ce6f5711ec2bcc9184fb855a6bd2ade2ee519905be7ea8329b11b5b1aa5a08105741645ff0cc01b27147f2b800fa88874ad94c2118e0dac7fc323693ef5bbf0d8167cab251fe0072e612acdf1c7cf5cd99513ad9414076573052", 0x151) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) setxattr$security_ima(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="040cffffee9e0a2f5c17790df0ffffff26445a99d6d2fa18d0512c27ffefef48a5d00b83335e7f06f335e31d79597074ef4f59d6c5ad66cd279c40271c6eff79263490dc8ea53c372ec33bb73f3b5ea903a039b6502c7f073d6d3f31402e63efa96f350f6a6328c264db0088f87ef4fe3764c220f1e69cd254a5f14b382f0095593e845aa67ed01fdbf16ce62b83cf53a342dd17659d2ad8b89e3032cf8e23c71efbab7d8ffb5d3e86017cab4ee392a48313b867d75d96132d57c5d7f3674a6ab06a50c777fce8ae8de777"], 0x1, 0x3) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000300)=0x6) setxattr$security_selinux(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x3) ioprio_get$pid(0x3, 0x0) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000780)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x14000}, 0xc, &(0x7f0000000740)={&(0x7f0000000540)={0x50, r7, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r4}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4010) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 03:14:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x0, 0x4000, 0x820, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x0, 0xffff, 0x7}, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xce, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a1"}, 0x1e6) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:00 executing program 3: write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffffff) 03:14:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x1000, 0x1000}) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 564.339234] audit: type=1800 audit(1565666040.192:106): pid=20283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16641 res=0 03:14:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) [ 564.403095] device lo left promiscuous mode 03:14:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100000004, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000240)=0x1ff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 564.458044] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 564.476378] audit: type=1804 audit(1565666040.192:107): pid=20283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir779053894/syzkaller.HWXfYU/572/file0" dev="sda1" ino=16641 res=1 [ 564.506269] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:14:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) [ 564.566946] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:14:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:00 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) 03:14:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a3000000000000000fa82bf7b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000240)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000004c0)={r3, 0x80000, r1}) [ 564.705281] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 564.734070] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 564.749917] audit: type=1804 audit(1565666040.262:108): pid=20293 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir779053894/syzkaller.HWXfYU/572/file0" dev="sda1" ino=16641 res=1 03:14:00 executing program 2: pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000600)=""/164) close(r1) flock(r0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) clone(0x0, &(0x7f0000000140)="b30b488b8d030ab103b38ba2b3c644e1e22aafa3404e6e091f17a9d5690ca8195c780f21b8cc8d044454ec970cdcf4345d8f99b6e6a34c2c48761c48bb752811890e9f2d0e02d021d6b30e79540e616d0008e6ce1f", 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000005c0)={'veth1\x00', 0x200000005002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2007fff) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x4040, 0x0) timerfd_gettime(r4, &(0x7f0000000480)) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000400)={'erspan0\x00', {0x2, 0x4e20, @remote}}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fadvise64(0xffffffffffffffff, 0x0, 0x7, 0x4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/policy\x00', 0x0, 0x0) write(r6, &(0x7f0000000900)="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", 0x151) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) setxattr$security_ima(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="040cffffee9e0a2f5c17790df0ffffff26445a99d6d2fa18d0512c27ffefef48a5d00b83335e7f06f335e31d79597074ef4f59d6c5ad66cd279c40271c6eff79263490dc8ea53c372ec33bb73f3b5ea903a039b6502c7f073d6d3f31402e63efa96f350f6a6328c264db0088f87ef4fe3764c220f1e69cd254a5f14b382f0095593e845aa67ed01fdbf16ce62b83cf53a342dd17659d2ad8b89e3032cf8e23c71efbab7d8ffb5d3e86017cab4ee392a48313b867d75d96132d57c5d7f3674a6ab06a50c777fce8ae8de777"], 0x1, 0x3) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000300)=0x6) setxattr$security_selinux(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x3) ioprio_get$pid(0x3, 0x0) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000780)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x14000}, 0xc, &(0x7f0000000740)={&(0x7f0000000540)={0x50, r7, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r4}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4010) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 03:14:00 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) [ 565.180866] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 565.187437] audit: type=1804 audit(1565666041.042:109): pid=20332 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir779053894/syzkaller.HWXfYU/572/file0" dev="sda1" ino=16641 res=1 03:14:01 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xce, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a1"}, 0x1e6) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:01 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000100)={0x8, 0x3c, "74ca7d05a4cd445a33664f94c9af1373a2c45a8467e475faaeef383f6a9c2215be49ce5c44cdcf6729524c3dd123d29a604b914a72b3d2444644a406"}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x480004, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:01 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) 03:14:01 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') [ 565.229783] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:14:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:01 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x100, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x5, 0x7fffffff, 0x77e3a3f7, 0x9}, {0x7fffffff, 0x969, 0x3, 0x3ff}]}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="0b0000007379e9651a4f06ec604b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000088000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b000000000000000000ec11e594d13f569f7421049f467dc1cc1b4bfa6d25d93f07f135ed40934716b6415102cff29e80269a63362dd8acc21eb0d86745141f999898c20d412d55eda285c9e429a876e17af01dccc4ebbc6f8a71aa6b222dc80cf0774f27932f0df4f8e9d1e15046f2239a4af051f2c2b354f8032868b159f746d31d1d025dea7d8785994ef3b1224f5b3ce76246c8a42070f7aacc6b5927715c4f9b35a6983a3d835d"], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 565.326310] audit: type=1400 audit(1565666041.042:110): avc: denied { read } for pid=20279 comm="syz-executor.3" path="socket:[68166]" dev="sockfs" ino=68166 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:14:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:01 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xee71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 03:14:01 executing program 2: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 03:14:01 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)=0xfffffffffffffff3) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b2080a3d20bcaf55e370f5f3f93089314891608631f3a20717e9a33aca488490e5d2e90eb581519a0886338df"], 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) [ 565.657433] audit: type=1800 audit(1565666041.512:111): pid=20370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16713 res=0 [ 565.812043] audit: type=1804 audit(1565666041.542:112): pid=20370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir509215218/syzkaller.bCM3hN/469/file0" dev="sda1" ino=16713 res=1 [ 565.983336] audit: type=1804 audit(1565666041.602:113): pid=20375 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir509215218/syzkaller.bCM3hN/469/file0" dev="sda1" ino=16713 res=1 03:14:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xce, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a1"}, 0x1e6) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f00000005c0), &(0x7f0000000600)=0x4) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f00000004c0)={0x0, {r2, r3+30000000}, 0x2}) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000500)={0x2, [0xd5bf, 0x9]}) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000540)=0x81, &(0x7f0000000580)=0x2) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:02 executing program 3: setreuid(0x0, 0xee00) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000070000008608831333180104"], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x0) 03:14:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) sendmmsg$alg(r1, &(0x7f0000002ac0)=[{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="ebddab3359b8c9cd04da9faf86c19becf7f361abc49c4f36fc6a574b52c51dab831795ada41b3b3997f647fb8afbdf184e8817129b476c349d9ecdba66c680ae465fd53fe3ea50da63634c946a2387d47deddd2c748794cf72680143ddc631e27dc00974", 0x64}, {&(0x7f0000000240)="e81372aa850f950029e654e182f57737033c3cc4a45825c7b23acc251105de26c70a31255f5b4a58d7d31c557ec7ba4e1b016f54", 0x34}, {&(0x7f0000001540)="4c948b0a7a65e3f0dae6595ac7265f1a2de0cb1d6ffc48ab97ce9ac1dc298d7507f54e9a0f8f8c20ac1d671e1e5a56beb33b803878f23323bb20e65edb5149e648d395a1b835410d16f915e4bba7d00117eee6", 0x53}, {&(0x7f00000015c0)="78f918ca34c2231c6c486afa90f652b795a1dfb5c0bec4968b4e5bed0bd6b8c137a31f897a1c6fbe5d578773eb44295bffc249c889042ad9645482a0e38d55aae637f5ee1a271891821cad28f64e42", 0x4f}, {&(0x7f0000001640)="94a7737bd6e03cf841885798e074a6ee9f2a5f99a37099a48f843245db2e842cf197572047afcd72db26ff61a7bd7264ef2f892c3bbf7fe95daf34da8bab5d3501d1e1a72930c82e195d1640b1d2c7d58fdab131f7aee4f729a60e9ec842db9c6bf8cb2df49a35318f988b8edf11d40245d51a419832f9b997508381e5b2fa84d55e65736507e88fedc349177c5fa1aa8954648713c661ba5df27bcd7ad32d4817aa711e45f07861e89115b2e36a64fa638c079cd00a442cca3fd9041c8445f6bdf113235b30fd45d0c15a843097ffc0abf88ab7", 0xd4}, {&(0x7f0000001740)="8b58f6aa0e922645543b4b7cbc576a55122ceea680410c3df38d39dce301c3568c16eca7909bb08a", 0x28}, {&(0x7f0000001780)="87e31b54d5874caf73c5ba1686bd5c8aa918d0f6c3275d2d6502cc392d70bba305ff4829323490877794f1a0cad363ed02af6b9a74eb1d5e3e940f4bd9ae9e8626d027c6bb5f02ac374cec26f3c9699f6faf6290f649dd60bcec7f94bd18aff33dfec662d26bcca794eccb3dca6f6bde60cc71d26167140d589502836008ea5947c5c6a8c8f9e37ea46504da2a3187119b2a18bd2cb042278f6f29823dc771938689e66f10ba91300ed04c418d7b631819c607cd44c5f5749c9018c65b3ee0bde7cfc33025720d955c48016530ddc558b3f04ce8a6043b1e5c6913bdb7abde1217a81102ecdbc6d82e2300c64a017521aa580da1519ee5c2905fb6821954eca21d988ad1c46d7afcc86fdf13aaa22c4ed7aaff879d4081dca5c57d50b866721d486eae5b441e1468031dc303dd4df936bf74bea581b9a87ccba1eff062149becf12d88cfeef68b01ec943ff583cf9db8ae3e62aae26887f8fb79f2e3fb8871dc1a46909f8938d134f99d6126835c430f8ce16f5f0662effeec701b4f69bb07c3fea87b3f443c8d136f005375e84f3873858384459125a818582f11610f2b0269b9c55ae1ec460e59674042f158cca123c57e38cb663a61a0cfd71328ddf9732e460d613cfed45d81027ba1edc9a114fbfe7f02bceabcc2901641fbfbe9053c2bcb18f7357893c78435d8c8b567400042992a6e72bd49ce41a6a8f62d0e62abe73fef498502392ffb7573c91a7c7de1f43feea3cefd8eac5401e5f3250a6794407232dbfccd6d01db61d65c7c11635ffcd4f49cd7e69c15bf7796440958199876f217df13b8aea84efd0cad2de3ef4e78cff2f0de5c05e333918745c9589de4249bc99338322f17fbbdb69079a057121bf5eb3c53c6e6663636c6d68e963e00480ed40ba19397e96792dd10e522cca80a726a42f02a629bcba87f4b2c2386d65e44ad4a40a493d2df644456042b79ca72191b56512ac9a7ca46e7d5000908bfdf228be00a3633e1f68c9a14dd9849d7d4fbb8dfc3a413e2b61704ff02f5b3fb5cc0c427cab5cd3a66f51b1c252c7117d855e4d524e5bbbb57f45f5b057cd9d386cc80997f2d4e79dd12f2ea84a9717ac5ae47bc8d4bf8adcc8b8d3a25595d3ac8c3031ec8410a23089d034a2302cfbf4730be1b8100088b5e4474931428ef7576a5e5f788b2ad7543e3775c8f0bce3a43ce00b830b29d7038adb38ec781cf926b115ac4b54bd701aca2719aef6b85ecbbcf9b503078b30cbdc03b0649e012755b8aa4468172da4f6954facab4db9075c0bdcc7a8d5b3c13b40882cd73fabeb99a37fb3a31e7b5648760e774cffbc13f849da6582ca82c8ccd595628518c9d56e5b8a9badf8afbfda167a70d585d4c174cc191eae76c2631cd66a7ea7d989f0dd67d77f72400312652b66a7ae7512d2780e0450ab9f05ee59296067c2b512fdbd09db0c5c26bf31422983650b3d21efc9804044b00b98eef49b4251ac87d1da0c1d21083bb62a87ab0472c7b04c76d583848c5bf0885039b3a4998ff34293ffa8b5f28f49314c88dc1360c29fb5428320fa11458b4d181ef1becd9a56af1b7b67a321786bb6ae199e5ac77cd0b4463c4d25ab429c243f82b03919696a55700c55eedaa971d9d7a8f6d931db718ac3f0f494f267b2d1d879ac600990322cd740767d79ce0333b038a11c1b5afb0634836888d28d99636cae9f50ea5b1cd6ddfe5db4d30de8b5bc0274a83eacfc8a99fb84bd0f5fc80c5f03234673e35a4965d952621cc337e7e558dc4ab778d0d4a41aa7f41c06722879bfdcfd101969e6e278c6b2e2a85ae4dc23d4ad7ed0ba7a51ba1f4ecf302ef8b13be5a0a6d375abb92fe1f24e50e82339a847be3c903b21254f19c7ab2d428ce445e91b5472e70b7c2ca19fd708f75d6bf6a915666be2ca540174f70354cd94ecf2081219212a6d427aeff8f3a9385034b5e010dd65e4edc6b7c64c1efa5d1b418ae2473e79d27687f2b87d5787d6acd6700c806dcba99741647f61d082b982528d8d4e12731df0822b5b42e47af2edb93ca7d3d5c280ff107b7d56890cc92d0ac3c38c44f7d3080f5b448e351dd256d38778b66a9941d52599bb4769e60573e677de8858a33afdb1efa42f017766f5b145a862e31f311340c1e52f29b5a8ebb920a954679ea88cb03dbe17a7bf14ed8eb235db645d1925fadac291287562edada8f97a0ff3e9844fb015a9da7d38ceb88b4260217c594a7d3dec0b00fcc7aa86568eb23cd479c521f2b6e1371d7d459f59714fb2f2e809ede43aa5e072a7fd3bc520197d2910f5b8011b50035f7b8cd63f2b8b87145e4c5d1c0b303db3b4c13f2941227289fdb6b7d2d4f7545ab087a2ec8f551eeeb6495c1b8744c9581026d68a24a600610e4d86ea2a71e119c3f60b3ea0fe10b2385083b3256c886fc81afcaaeb657e3c719c6a782eaedee4b37746a91e8b0925bc19344c80efc0c13211e993b0822fd4eeb1d17b8885e0dbbfdd1ced411053da2e0eeea674a696b4594f6f5da5a203254c0853b74f5efd3cf959246a3cb4bf5294dd1028c690a54122719c1e1310268123e714588f959f112b2ee0125138170c8e837fd47d24f9a28987d1dbc1b6437bb5cf23cf9ff8de38d4ad035291362b1da91ddfc9f6c2f7a935e7057c5681692ce9ca82a4a71d4e4b6784111062aeea37a372bfd74fda8022583cb8bbdfc26efcc0176c4f0e498125d6fe7986e78dc2adbb1305d19a702496d7a4cd8c07d3c805fa2265fdab5e4dc0a57c2d8f9f8b01f32b624efbe12dc6bebeb0f81350ba1f3b1f7adb63ac1915c0cffcc0dcbbc8db531a385430c43d993bfff4f228e05cf4dbac441bfcc9e877976e0891e6142e4dd96c302640ed5918aa5e126a9a2b638371dab02a49f969118992027c17318b7484145c83d11dc85bc659f42ce7e681bc826aa43854a6fbae77a805f904d47db978565980df9ff97ba4851196beaaa9db420a306314037eac60983add7a4eb4d5749f068108fec9be77249dcdbcb708c4d39a695b9de19e820c96b4a93b57caee7242d4a54535cf92b129052d1a8a7292d3bbf332d5712a47b8e100b7fb2bf14eb8473d45584a1f3648d05d55083924623c62ed05bcc2c19d91ec76fe3edbbad6b00fd81690a39bd0f5cdd1414d991cb422e8e3635a4be47d423b84e0139ed7de7d876c96e6a3e9ccca91ff26120f3e52c909d20b2928189849b392e1718e0f4bbb24f85f9341933097ce3492b69c148f5c16f31a50c2ce72ec9069411b983c15bbd25e634fa681c8e9948ead678cafb7e6108ed4a27ffcad1f3d90ad4b72ffb778abaef0c94477bcd0998199b996f452983a27c5096580d53b81a1fee7cefe840940f8e6e7ca9a22f5b00798732c41da218cf2bdc057ebf6a7d058f80a71765b69a0aa92122e86efb48e32d2bc5b8e4c1269672d34eac4d0cdd009277e52918f11572bd7affa7accc140b2ec89b17f7d04876b0cd54118481af5d3bfe64e64321b5a42b70c8fba7ad388e1e344c044d7b07a927ccdbde1d73879eef1a3ec734457a5a8bab334dc06c57ef440cfe60dd49e84e3bb9530250f93c90b860d9fc1dc0dec1fb395a95caf6fee812ee955560535ed8ae60af19f53e603ebb42241ae17aabe55ef0b7e898d219d987ca1c5a7673536bdc21f68cc4288d6656b692067f2d21e74bf98e00928ad042fc98d9877cb53bcb7abbaa1bc1f2ae92b77add7e4cdbec86078b2627e3b234dec4c2a5b52705eb97b32d040ec23c4f83c2eca0e90d5ee8e00d3db98b3a240abfd40ee9c2df8c61de90f491ddd0e87ba8747a73a04f6926bea36cd2e667965ef76c7c2283de38951ba4fdb2e96eb650c1e3d2b3e96f41c0b0863fbaf0f9f7cb8c39066ff1337cc74a5d0989b01c70198222d3b0faec71a852fd7a29d5093004d96f97c268f46f05ad87e3bed7c94f7d636ff6cc124b62bdbda4bf5a4667ddff11e13cf2201fe4efaf1dc765746ee8bd6ecc00aa42c06150df42b99a6c28511c755395d3f05d0f08e21b03afffbdbc8a68dac1b799414fea1cd9465f93596d487fc776a9773310ca4299de7a17852ec4fe5a1478cd422e04c1c4aed4de243dd6f7be203c25730d4a1e2b13b70d56adb9c9ef7d456711e42bd2ccae95219c5b8539593ab69b676e66d52b343c835c2dfe14938b3de43a6a4750ea243b0dabd98095430de9b8cad30ba30e39c5df391fb07de6e86c0ac37348238a20a75418c9b7ca491697d18b8710ec8d8cbe795a76fc5a0de01dd5a8ce87716b80f1f7ab645346ade78b94bb12071b254c2776e1e731975155c0da590ae2c227878a6aa4de5bab2c0b0dc3e294d86e8af9d1dfc8173b3a1046233641d4881a1fe5c30c22a777dca21804f7bdc80a77ac1e97b8e0afef0b90925c0836d769938e4e51706c14abcf74d92195e32a9e25d62c49af8d95fe01e0a172c73811d1c67cf473450e8316d6edef69d921a007b32174c7ca1c857b913ae33b1d9f1ff3a90fe2fc50df708641930cd8bcda654f07f3c33a594a29c1dbf0eb4036c98955b1ceba35cf0e2d70fbad6d12b99a7535c10c9540fcff596c3710208c3694b759132e3561a8926efe74408b9e9310af0bfb518e2e6a91684c79b6e9ffa42f73681d294618f99e6536d068f6a3fd6109ac1765fd5dc2e0270cc7c12188dbfee1d0ab88f7328e0d3fde9d1373d89f13ef2586c0d970f921f49f3f7de0f47c05a3455fad45e9cbd793a374407f3756b2091fe623a996df7d3c2999af5312f069661a08f2d5f3a1e8e4885fa252fa51783b85f1764c261bbfe9771bc540eb6df7a0e742e53173b08d8ca7df3ed3c192ab27c0ee8de269e22eccf2e2d697322a3a71804a6cbce0ef1b39facf270ed3992da7020eadbfe1b90c6ad860024ba5190bc481284e525694c793a989519963734693ccef9049d1bafdd22cca0f253b55e89f36fa70e073653ad5512a584d450043dfd68426e642b7554b38eef286f2af783c82d8aae6b0cac516a1a5b36d8567129649935266ca75269d79ca5ca5dbdd67a85a963ba00a099b60bd4fd5aad953ae0984dfe44ed76baebebdc586807e9b125b12b0a6682e89c3d8bee85515b18004158fd2eb6cbe4442d4eeb0545e54e0253a7a8b6715a14244d183d7813be8cd02718240541a4cd589197bdab4632d545b5afeac7801b7caf91b94a326d304ce01d00e723bb6113cc8c9c6b725610a03673342e0d451ef8b89a5a895fbdb8ff0f344e92c680474c19e0b448a6184160970973b905dff2f4ecdb8394c3924e18844a9ea58559702e329c5948a2bc4619b84185948e4038fe03e14a919ba79fe5cf6f053586e37aa90ebb6678b0d936be51f3689e66622362127db8dccfaca42cd14c743759be540faf487f19291f4a44ef16848174e8735d9a2979826376f5f75529d6a662c7c9d0a620897cd7061e06d0b071cb21445f669daac32fd5024148f4b1e57633ed5d2c0f10f5175d254b9e0f46c33b91904655ca978a556a6f75cb6e9d151df88c5d88169509944f80a16e6afd31c0a3786a9591467b68f4d8d03404381e0be86e9fbd8bf985a12841b500972462fbcb72582e8d06b3e07365db8bc0c861966896a316cc7b33f57e80dcbf9560e4cdc015ca65da5276be6dd5bd58e44f588b2dc831aef3745d4ff8d2592d8292beccf8ac8488f6fd0a4d25eec560cc34507e72a4de6bdac31f680b1eda438cd763bbf144f27c6c9e6858e99e12c988d214536a548dc438bff3c90189fe44e9196f092c8f179078d9d11432bf467ebe2bd58d861204233", 0x1000}], 0x8, &(0x7f0000002b00)=ANY=[@ANYBLOB="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"], 0x288, 0x20000000}], 0x1, 0x8000) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000240)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf0006af01040000080000000080000005000000b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df9b0a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ccee01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"], 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) fsetxattr$security_smack_entry(r1, &(0x7f00000004c0)='security.SMACK64IPIN\x00', &(0x7f0000000500)='\x00', 0x1, 0xf8380c58e2f1cb67) ioctl$KDADDIO(r1, 0x4b34, 0xffffffffffffffff) [ 566.475860] audit: type=1804 audit(1565666042.332:114): pid=20397 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir509215218/syzkaller.bCM3hN/469/file0" dev="sda1" ino=16713 res=1 03:14:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000b40)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r1, 0x0, 0x9) 03:14:02 executing program 3: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000140)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_map}) 03:14:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) [ 566.702783] audit: type=1804 audit(1565666042.372:115): pid=20397 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir509215218/syzkaller.bCM3hN/469/file0" dev="sda1" ino=16713 res=1 03:14:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:02 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000280)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000240)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:02 executing program 3: r0 = socket(0x100000000011, 0x2, 0x1) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000100)=0x5fc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) 03:14:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f00000001c0)=""/165, 0xa5) 03:14:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 03:14:03 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x40000000141042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x261c41ec}) 03:14:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x4000000000000005) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='\x00', 0x1}], 0x1) ioctl$TCXONC(r3, 0x540a, 0x1) 03:14:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:03 executing program 1: r0 = socket(0x100000000011, 0x2, 0x1) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000100)=0x5fc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 03:14:03 executing program 2: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vxcan1\x00', 0xd432}) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0}]) 03:14:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:03 executing program 3: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vxcan1\x00', 0xd432}) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0xfffffde8}]) [ 567.464897] device lo entered promiscuous mode 03:14:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000000, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000200)) 03:14:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:03 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:14:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000700008d0102031900320800"], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x32c, 0x0) 03:14:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x800}, 0xc) 03:14:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:03 executing program 1: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00', 0x7ffffe}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) 03:14:03 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000100)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff87, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:14:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x96W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 03:14:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000700ae4da51c031900320800"], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x32c, 0x0) 03:14:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x35, 0x0, 0x2) 03:14:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x32) syz_emit_ethernet(0x437, &(0x7f0000004e40)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60c22df704011100fe800000000000000000000000000000fe8000000000000000000000000000aa00004e2004019078000087ae00ca83452b00b32def4f1142b6793bb530f9b20e90aa25d5c2b9431efd840a07c1922833b2c789aefbbaee9f63cbab38a8acfb8dba0595ecb683e74ea2bc44a7aee9c52e18ca01c06a5c354712b8b1ff75f45ba55a3487c83849023d37e0ba099e9ed8775d1173d8e78335aa65d58f54c1d78d4fce897cfefa24b7f285f90be76c7f4e1bfe4d84a869353e931c3732afea55697618a1318ecb657b34172b93fd59d7988d43630cf81e976a0ea01fd8b2547ab593bc605c985f56664b84ed3c9f90ffb666e030c794e2d2d5070af38d83dc275da88cfe6910b2ded59f6c418af5d247237eceb14857c1d7c3ee32e729d9793040f8f4e432eb875a89fe31cbed117f0e76643797169fba3dac3f377d145ce97980ba626da7a279e698a9e040a22d63c535f0ee06adb59e9e0ead7295e6601f3a5fe957607f8c6b22b581975993c6c775734212bccb26288d42a672c965d40e80d0e1908f04425a60a08241378ec7ff88315de073b64c5f9647e51732be34988e0948f12e6c560bedbece811bca501d4389dbfe20e4df5162cd7324c0670c7b3e8980b061e31b1c8461d6f7a63f9e9fd24326924c076e01631a0b9703a61062ccfaa064075fa1f16e16c5171b6a324e8642b2ab76618b8241a8bf89490982636b78d1300befab1a2f6e8261e07336c5692db37bb7d3cebf4a942b62f2fa6cceb7e488aa02b2e52c6f82bd3792845fff41cce52e0469d14821ce11591864860c11421a92dac679d2b1f0a9809b56abdcf893f9531508f24e64ec911fd8e8b3c8fd2291f1a7b910222c38533d4caadac9acd194be7e53549c1719bdf668887a0e19db83b5356f8f7d93cbef1ef3505dcc40d0d2a02a2745ab518979b9c3774babfe8e70ead767c7a00289b8cc6e51d1a957548270cb3f5064961a88f61b34f9442d78ae5a8551713f9afb4269d689f9adb6b4a902a637184f7f899efe9fa0ddb45cd1076c4eeeda51ca8dc20dcfc9cc5f56768073b3f4c2c9f543324a4fd0b8bc7b95e232bf85bf222394fa4336ab4007d7ad2dc85afa6eb79ad2624c4be6c674ee98fce9a51786b7cc2b5044de114d36d2690e13bcedf96590c7d5aeb8040b74c4d6a5aa38a7c1f0857523f4f968795056b9a7034dc3444784f9486b575e44dec3216d72845500e63297d7197961e7e593ea3411001d1d47ba42d70e7af8e91246c02d7e37ff0eb60abebc37dd00315b4fbb09e77a6b5f7e8441818ebcfafecf622731f1db8a11fa2de8e30d808bedbfee104b3b1100f5094675521da07dd2a28be7e486b325a0f0e6d75116be1bbc2aa20deb64a6e4e7b824b12d009e6f1802f5a8e31559b125d71d00a5684fbde4668f5af1eb4ca04fa7c4ef4d2a194b0856e0077eee69a98b6127b98307219f3a8d4b043c4a149742fb6b43000dfc43f084798cf024ff2d7e738d580469a3237ad7f481f3b19d452c928e20ce176db2f8e9d21d93d0939def7d4226e20de463b3d0e7aefe6a4588b3654e1dc97a2fcbe908a98958cf496c6ccc3441a9f43b2d95169b3e1fc22d864bec836317e1a34ca10a4b9e2c781b3137efe96800b6a462f474b0fea62b5e9993e7a06b5d02204778352d8110535862684b1761fbc482e4371e583e640400000001c5000000000000001973a31c32744acabb74717f637cd56141635cbd29ebef9a187e5f55a20000000000000050b9"], 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0xe82786a5d41fcdbe, 0x0, 0x1fb) 03:14:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) unlinkat(r0, &(0x7f0000000340)='./file0\x00', 0x200) 03:14:04 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) bind$bt_l2cap(r0, &(0x7f0000000080), 0xe) 03:14:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 568.721438] Bluetooth: hci0: Frame reassembly failed (-84) [ 568.721594] Bluetooth: hci0: Frame reassembly failed (-84) 03:14:04 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000240)={0x0, 'bcsf0\x00'}, 0x18) 03:14:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x9000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000240)='./file0/file0\x00', 0x141042, 0x2) creat(&(0x7f0000000280)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x858, 0x20003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='cpuset\'*$#\x00', r0) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={0x6}, 0x8, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x8}}}, 0x18) r3 = dup(r2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$setregs(0xd, 0x0, 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 03:14:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:05 executing program 1: r0 = socket$inet(0x2, 0x6, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780), 0x10) 03:14:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 03:14:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup3(r1, r0, 0x0) 03:14:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") capget(&(0x7f0000000080), 0x0) [ 570.790114] Bluetooth: hci0 command 0x1003 tx timeout [ 570.795438] Bluetooth: hci0 sending frame failed (-49) [ 572.870138] Bluetooth: hci0 command 0x1001 tx timeout [ 572.875434] Bluetooth: hci0 sending frame failed (-49) [ 574.950296] Bluetooth: hci0 command 0x1009 tx timeout 03:14:14 executing program 2: pipe2(&(0x7f00000001c0), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003bc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c00)={{{@in=@dev}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in=@multicast1, @in=@local, 0x4e21, 0x5, 0x0, 0xce, 0x0, 0x0, 0xa0, 0xae}, {0x8000, 0x8, 0x0, 0x0, 0x61e, 0x8001, 0x0, 0x24}, {0x0, 0x7f, 0x0, 0xe2}, 0x7, 0x6e6bb6, 0x1}, {{@in=@local, 0x4d3, 0xff}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x322, 0x2, 0x2}}, 0xe8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x0, 0x2000) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x800000000000004, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 03:14:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000100)='sched\x00') write$UHID_CREATE(r1, &(0x7f00000003c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x0}, 0x120) 03:14:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:14:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000080)="3084d353ff072d68b2e4dc14aae01a65db") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:14:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:14:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='maps\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/230, 0xe6}], 0x1, 0x0) 03:14:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x32) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 579.306619] Bluetooth: hci0: Frame reassembly failed (-84) [ 579.312848] Bluetooth: hci0: Frame reassembly failed (-84) 03:14:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/230, 0xe6}], 0x1, 0x0) 03:14:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ip6_tables_names\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/230, 0xe6}], 0x1, 0x4) 03:14:15 executing program 1: io_setup(0x800000000006, &(0x7f0000000100)) 03:14:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="38f3c40047a040c42bc55a891b0f0115"], 0x0, 0x10}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x6]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d}) 03:14:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305616, &(0x7f0000000040)={0x0, {0x3, 0x1}}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:14:15 executing program 1: getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) creat(0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000200)={0x7}, 0x69) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000240)) 03:14:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0x0) [ 580.215592] BFS-fs: bfs_fill_super(): loop1 is unclean, continuing [ 580.452704] BFS-fs: bfs_fill_super(): loop1 is unclean, continuing [ 581.350111] Bluetooth: hci0 command 0x1003 tx timeout [ 581.355425] Bluetooth: hci0 sending frame failed (-49) [ 583.430151] Bluetooth: hci0 command 0x1001 tx timeout [ 583.435444] Bluetooth: hci0 sending frame failed (-49) [ 585.510268] Bluetooth: hci0 command 0x1009 tx timeout 03:14:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) 03:14:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x10, 0x0, &(0x7f0000000380)=[@clear_death={0x40406300, 0x2, 0x40046307}], 0x30d, 0x0, 0x0}) 03:14:25 executing program 1: socket$kcm(0x2c, 0x3, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x70, 0x0, 0x0, 0x0, 0x900d, 0x0, 0x0, 0xc000, 0xa, 0x0, 0x1, 0x401, 0x0, 0x40, 0x0, 0x0, 0x9, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000001, 0x9, 0x8000, 0x0, 0x400, 0x9, 0xffffffff, 0x5, 0x0, 0x6fd, 0x2, 0x400, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x400, 0xffff, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xc) socketpair(0xb, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xc88f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000001580)='&@[\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[]}, 0x20000001) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:14:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x200fff, 0x0) clone(0x70024103, 0x0, 0x0, 0x0, 0x0) 03:14:25 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x3f00) [ 589.941580] binder: 20695:20697 ioctl c0306201 20000480 returned -14 [ 589.972314] IPVS: ftp: loaded support on port[0] = 21 03:14:26 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:26 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') sendfile(r0, r1, 0x0, 0x80000005) 03:14:26 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 03:14:26 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x3f00) [ 592.070243] Bluetooth: hci0 command 0x1003 tx timeout [ 592.075542] Bluetooth: hci0 sending frame failed (-49) [ 594.150167] Bluetooth: hci0 command 0x1001 tx timeout [ 594.155491] Bluetooth: hci0 sending frame failed (-49) [ 596.230171] Bluetooth: hci0 command 0x1009 tx timeout 03:14:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) 03:14:36 executing program 1: setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) 03:14:36 executing program 3: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000006, 0x40031, 0xffffffffffffffff, 0x0) 03:14:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000280)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:36 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001400)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x40000000000003, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400022339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:14:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:36 executing program 1: pipe2(&(0x7f00000001c0), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 03:14:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:36 executing program 3: r0 = socket$inet6(0xa, 0x80000000000001, 0x8010002000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x495}, 0x98) [ 602.230139] Bluetooth: hci0 command 0x1003 tx timeout [ 602.235433] Bluetooth: hci0 sending frame failed (-49) [ 604.310169] Bluetooth: hci0 command 0x1001 tx timeout [ 604.315476] Bluetooth: hci0 sending frame failed (-49) [ 606.390182] Bluetooth: hci0 command 0x1009 tx timeout 03:14:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) 03:14:46 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00'], 0x20}, 0xfc) 03:14:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:14:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000140)={0x4, 0x2b, 0x0, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r2, 0x404}], 0x1, 0xffc99a3b) 03:14:46 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:46 executing program 1: 03:14:46 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:46 executing program 3: 03:14:46 executing program 1: [ 612.550121] Bluetooth: hci0 command 0x1003 tx timeout [ 612.555411] Bluetooth: hci0 sending frame failed (-49) [ 614.630224] Bluetooth: hci0 command 0x1001 tx timeout [ 614.635540] Bluetooth: hci0 sending frame failed (-49) [ 616.710124] Bluetooth: hci0 command 0x1009 tx timeout 03:14:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, 0x0) 03:14:56 executing program 3: 03:14:56 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:56 executing program 1: 03:14:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:14:56 executing program 3: 03:14:56 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x3f00) 03:14:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)="2ecc2d460c5529098977bc22f0adbda7df157049d48935a3f5fdabe769ab2c8cf24ca5d7702b9d839bad515f3febe7c0de3954c98b080f17e9746f61f0e451b0f6f9340489eb1ac9513709d2fdefcd55302e661eb55cbfd3a16c01f2bbdf0a34046b22774dd8e648ad0662e1791015203c91315f978db006a4") ptrace$cont(0x9, r1, 0x0, 0x0) 03:14:56 executing program 3: inotify_init() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x211d49, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaa2d7c070000f00086dd60b409000003000002000000000000000000ffffe0000002ff0400000000000000000000000000018900907800092900600100200000000000000000000000000203ffefffffffff00000000000000000000ffffac14ffbbbb1bcd09288ee3527f871edd6703df000022d4a339eb76aeb8b6e84d0a1dfc6a1880cbd31f50aca32b4cb84d7a8aacafc3804ccc44a8c5b4f6c46ad360b6bc3bc9ad58ef749cecc7c39daacd5f4fd855ddc4018d82d94d83f99d149bc667a43d5c9a1c090bfc05cef1e066ea60da91b4a814d7e405288f98e4023da98590395e56c76a0bafcfca509582663f26594be2949b16b0f4adaddd70369ef438545289a71e8e36691e5c082d86664e8bcb484397416ef606b525c1f4b06a682adbd7df2533faee782ac552e93f36f35b5eef0f3b5dde40d6cbf3ffc4242bdcb8f1a4a8ef0561b4e56b2c795f46601b2c68349e52c9ff22bf5361f53a5fd899db089be8d7fe2329ee9d8621628c65cd635381e0d2e2edf552082ef41e97f7ba7ea3a35047306efd12d29faff0b56b8310b2d16934f75a459c85290053ea3d42ff448024c1e1a5c80decff7ccc6da1e1a4ac1e0a031ed27bc0d9da6b0fd05eea82e849dea5d9aa922cafd2b6432bdc109056c699e3480e7da66e63e78be2dc1821ba6008759317c6e8852853b55fedf0cab129416dedbb76d9d2b361cd8a762ec7666b25323b304a34bd7199cf7dad51b9dd8bcc5010307be109ff5d91dc18613f14edcb19c45da8c4af7b2c3b3d3658f24cabff2e427e5fe7249e4f28fd802ddcaa01f565ce5b7c8ac315b9a370ed340d80ab6b1e402eab6592db5ef17c47048cbda42a560c1e87fe24c3ee06bc31f952646410214a0b55e3f48c09ab8b1b8a19fc429d0272a2273e872c47bc9995354886c1c18ad161e3dbf6280bb0bf2068c389860de365e79d957c145686226c9cb9acf59fe5b4f725a47db17d5b75e190e32a8a1ae08c5d649400"/731], 0x0) 03:14:56 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x0) [ 620.802122] ptrace attach of "/root/syz-executor.1"[20828] was attempted by "/root/syz-executor.1"[20830] 03:14:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000340)="e9fb21bf671116eb65", 0x9}, {&(0x7f00000004c0)="b9090cf6ce0229db27070266", 0xc}], 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x14, 0x0, 0x300}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000780)={0x180, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}, @TIPC_NLA_BEARER={0x108, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @remote}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @empty}}}}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x20008040}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = epoll_create1(0x0) r5 = epoll_create1(0x0) r6 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000180)={0x40002015}) timerfd_settime(r6, 0x0, &(0x7f0000000240)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r5, &(0x7f0000000040)=[{}], 0x346, 0xfffffffffffffff7, 0x0, 0xfffffffffffffe0d) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000080)={0x1000000000000009}) [ 622.790106] Bluetooth: hci0 command 0x1003 tx timeout [ 622.795420] Bluetooth: hci0 sending frame failed (-49) [ 624.870156] Bluetooth: hci0 command 0x1001 tx timeout [ 624.875499] Bluetooth: hci0 sending frame failed (-49) [ 626.950229] Bluetooth: hci0 command 0x1009 tx timeout 03:15:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, 0x0) 03:15:06 executing program 3: pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) lsetxattr$trusted_overlay_upper(&(0x7f0000000400)='./bus\x00', 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x1, 0x3) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) socketpair(0x0, 0x0, 0x80007ffc, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000101) 03:15:06 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) dup(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffffff) 03:15:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:06 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x0) [ 630.939994] kauditd_printk_skb: 1 callbacks suppressed [ 630.940006] audit: type=1800 audit(1565666106.792:117): pid=20850 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16547 res=0 03:15:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x4c000000) connect$inet6(r0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000380)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0xc0189436, 0x0) clock_getres(0x0, 0x0) 03:15:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x4c000000) connect$inet6(r0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000380)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0xc0189436, 0x0) clock_getres(0x0, 0x0) [ 631.134207] audit: type=1804 audit(1565666106.872:118): pid=20850 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="file0" dev="sda1" ino=16547 res=1 03:15:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 631.270275] audit: type=1804 audit(1565666106.922:119): pid=20863 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="file0" dev="sda1" ino=16547 res=1 [ 631.735564] audit: type=1804 audit(1565666107.592:120): pid=20902 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="file0" dev="sda1" ino=16547 res=1 [ 631.758160] audit: type=1804 audit(1565666107.592:121): pid=20897 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="file0" dev="sda1" ino=16547 res=1 [ 632.950147] Bluetooth: hci0 command 0x1003 tx timeout [ 632.955449] Bluetooth: hci0 sending frame failed (-49) [ 635.030245] Bluetooth: hci0 command 0x1001 tx timeout [ 635.035552] Bluetooth: hci0 sending frame failed (-49) [ 637.110326] Bluetooth: hci0 command 0x1009 tx timeout 03:15:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, 0x0) 03:15:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, 0x0) 03:15:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000100)={r1, r2+30000000}) 03:15:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:16 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x0) 03:15:16 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 03:15:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r1, 0x5) 03:15:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, 0x0) 03:15:17 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="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", 0xfc) 03:15:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)="10096f4b7ee99ef9d2888e3e0042b1e63084b16e53958264d2e69f1329ac405d6d92007b18b69d9e87567b191cdc8bfb47f787a5e4598a71f4f23693cbbb1f355178658eb90f2e7776a5f14d5f2eb0461d7f7cf681f0c8a8cd32ada88c8de8139170bd07ee4f88611a37fcfbc9518fb180269c73e341fb2e5e0cf5b1f24e006eb72b2f796e5405e17db2f483311ad6d7f943682a07356ab6df311018dbc7867212", 0xa1}, 0x68) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97e38f19c0408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e39808e0b61a0bf7a301ffe", @ANYRESHEX, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a7462010000000000000029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e5566b4d1447a982f0b0b061ef05d38deddd795e0b31aa0a9709836e23ecee4c4a7", @ANYRESHEX], 0x0, 0x133}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:15:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, 0x0) 03:15:17 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') [ 641.350419] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.1'. [ 641.440587] ptrace attach of "/root/syz-executor.3"[20941] was attempted by "/root/syz-executor.3"[20943] [ 643.190077] Bluetooth: hci0 command 0x1003 tx timeout [ 643.195414] Bluetooth: hci0 sending frame failed (-49) [ 645.270125] Bluetooth: hci0 command 0x1001 tx timeout [ 645.275428] Bluetooth: hci0 sending frame failed (-49) [ 647.350144] Bluetooth: hci0 command 0x1009 tx timeout 03:15:27 executing program 2: getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) userfaultfd(0x0) 03:15:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/203, 0xcb}, {&(0x7f00000002c0)=""/78, 0x4e}], 0x2}, 0x0) 03:15:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)) 03:15:27 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 03:15:27 executing program 1: r0 = socket(0x22, 0x2, 0x1) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x717000, 0x1c9) 03:15:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x1) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000300)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x3) stat(0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) setresuid(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) socket$inet(0x10, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x1000000000000159, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002dc0)=[{{&(0x7f0000001440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000500)=[{0x0}], 0x1}}], 0x1, 0x0) 03:15:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) 03:15:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)) [ 651.518848] audit: type=1400 audit(1565666127.403:122): avc: denied { map } for pid=20975 comm="syz-executor.1" path="/dev/nullb0" dev="sda1" ino=17180 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 03:15:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0xfffffffffffffff9, &(0x7f0000000040)) 03:15:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r4 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r3, r4, 0x0, 0x1) 03:15:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)) 03:15:27 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0xc01812f4, 0x0) [ 651.707424] audit: type=1804 audit(1565666127.443:123): pid=20979 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="nullb0" dev="sda1" ino=17180 res=1 03:15:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000340)=ANY=[]) 03:15:27 executing program 1: semop(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x13c3f2b6}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 651.879173] audit: type=1804 audit(1565666127.513:124): pid=20988 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="nullb0" dev="sda1" ino=17180 res=1 03:15:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x8000000055}, 0x98) 03:15:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='io\x00') r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x3) r2 = gettid() ioctl$BLKTRACESETUP(r1, 0xc0401273, &(0x7f00000002c0)={[], 0x25, 0x7, 0x8, 0x9, 0x3, r2}) r3 = eventfd2(0x0, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f00000003c0)={@initdev, @dev, @broadcast}, &(0x7f0000000400)=0xc) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000340)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000840)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000140)=0x100000000) write(r6, &(0x7f0000000340), 0xb5d5a85044acf987) vmsplice(r1, &(0x7f00000004c0)=[{&(0x7f0000000500)}], 0x330, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000480)=0x14) sendmmsg(r5, &(0x7f0000004180)=[{{&(0x7f0000003bc0)=@ax25, 0x80, 0x0}, 0x10001}], 0x1, 0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r8 = dup(r7) setsockopt$inet6_tcp_int(r4, 0x6, 0x19, &(0x7f00000000c0)=0x2bf1, 0x4) r9 = socket$key(0xf, 0x3, 0x2) fcntl$lock(r3, 0x7, &(0x7f00000005c0)={0x3, 0x2, 0x0, 0x7fffffff, r2}) sendmsg$key(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x2ac}}, 0x0) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r10 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r8, r10, 0x0, 0x8000fffffffe) 03:15:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r4 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r3, r4, 0x0, 0x1) 03:15:28 executing program 3: getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000100)=0x54) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getsockname$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x8, 0xde17b31672dc4423, 0x7fff) socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000002) futex(&(0x7f000000cffc)=0xffffffffffffffff, 0xc, 0x1, 0x0, &(0x7f0000000000), 0x0) 03:15:28 executing program 1: semop(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x13c3f2b6}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:15:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104, 0x0, 0x60}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 03:15:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r4 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r3, r4, 0x0, 0x1) 03:15:28 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'%cb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 03:15:28 executing program 1: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x2) 03:15:28 executing program 3: socket(0x10, 0x80002, 0x0) r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast1}}}, {{}, 0x0, @in6=@local}}, 0x0) getgroups(0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r2 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) poll(&(0x7f0000000000), 0x0, 0x3f) write$binfmt_script(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/522], 0xfdef) connect$unix(r1, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write(0xffffffffffffffff, &(0x7f0000000540)='\a', 0x1) recvmmsg(r1, &(0x7f0000001000), 0x3fffffffffffefe, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000540)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000002a001f00000000000000000000006f5a", @ANYRES32=r3, @ANYBLOB='\x00'/12], 0x24}}, 0x0) 03:15:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r4 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r3, r4, 0x0, 0x1) 03:15:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0xd101, 0x0, 0x60}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 653.023794] audit: type=1804 audit(1565666128.913:125): pid=21041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir193934487/syzkaller.LBtzaT/428/bus" dev="sda1" ino=16859 res=1 03:15:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='\x00', 0x1}], 0x1) 03:15:29 executing program 1: socket(0x10, 0x80002, 0x0) r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast1}}}, {{}, 0x0, @in6=@local}}, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) poll(&(0x7f0000000000), 0x0, 0x3f) write$binfmt_script(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/522], 0xfdef) connect$unix(r1, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write(0xffffffffffffffff, &(0x7f0000000540)='\a', 0x1) recvmmsg(r1, &(0x7f0000001000), 0x3fffffffffffefe, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000540)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000002a001f00000000000000000000006f5a", @ANYRES32=r3, @ANYBLOB='\x00'/12], 0x24}}, 0x0) 03:15:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') sendfile(r3, 0xffffffffffffffff, 0x0, 0x1) 03:15:29 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x0, r1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') 03:15:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 653.097899] audit: type=1804 audit(1565666128.983:126): pid=21079 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir193934487/syzkaller.LBtzaT/428/bus" dev="sda1" ino=16859 res=1 03:15:29 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) 03:15:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') sendfile(r3, 0xffffffffffffffff, 0x0, 0x1) 03:15:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 03:15:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000008d00)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f00000001c0)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0) 03:15:29 executing program 3: keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x2}) 03:15:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') sendfile(r3, 0xffffffffffffffff, 0x0, 0x1) 03:15:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000008d00)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f00000001c0)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0) 03:15:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(0xffffffffffffffff, r3, 0x0, 0x1) 03:15:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 03:15:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x2704}) 03:15:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(0xffffffffffffffff, r3, 0x0, 0x1) 03:15:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x21) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x4, {}, 0x0, 0x2}, 0xe) 03:15:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001440)={0x1c, 0x17, 0x101, 0x0, 0x0, {0x4}, [@nested={0x8, 0x11, [@generic='Q']}]}, 0x1c}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 03:15:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) setreuid(0x0, r1) setsockopt$sock_int(r0, 0x1, 0x3c, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000040)=ANY=[], 0x4240a550) socket$inet(0x2, 0x3, 0x29) ioctl$RTC_WIE_OFF(r2, 0x7010) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x80000) semctl$IPC_RMID(0x0, 0x0, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000100)=""/101) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) 03:15:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x2704}) 03:15:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:15:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(0xffffffffffffffff, r3, 0x0, 0x1) 03:15:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:15:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080), 0xe) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000000240)) 03:15:31 executing program 1: 03:15:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) [ 655.750115] protocol 88fb is buggy, dev hsr_slave_0 [ 655.755249] protocol 88fb is buggy, dev hsr_slave_1 03:15:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:31 executing program 1: 03:15:31 executing program 5: 03:15:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) [ 655.830147] protocol 88fb is buggy, dev hsr_slave_0 [ 655.835328] protocol 88fb is buggy, dev hsr_slave_1 [ 655.910226] protocol 88fb is buggy, dev hsr_slave_0 [ 655.915392] protocol 88fb is buggy, dev hsr_slave_1 [ 656.070186] protocol 88fb is buggy, dev hsr_slave_0 [ 656.075356] protocol 88fb is buggy, dev hsr_slave_1 [ 656.230134] protocol 88fb is buggy, dev hsr_slave_0 [ 656.235233] protocol 88fb is buggy, dev hsr_slave_1 03:15:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) setreuid(0x0, r1) setsockopt$sock_int(r0, 0x1, 0x3c, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000040)=ANY=[], 0x4240a550) socket$inet(0x2, 0x3, 0x29) ioctl$RTC_WIE_OFF(r2, 0x7010) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x80000) semctl$IPC_RMID(0x0, 0x0, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000100)=""/101) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) 03:15:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:32 executing program 0: 03:15:32 executing program 1: 03:15:32 executing program 5: 03:15:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:32 executing program 0: 03:15:32 executing program 1: 03:15:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:32 executing program 5: 03:15:32 executing program 0: 03:15:32 executing program 5: 03:15:33 executing program 3: 03:15:33 executing program 1: 03:15:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:33 executing program 0: 03:15:33 executing program 5: 03:15:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:33 executing program 5: 03:15:33 executing program 1: 03:15:33 executing program 0: 03:15:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:33 executing program 5: 03:15:33 executing program 3: 03:15:33 executing program 0: 03:15:33 executing program 5: 03:15:33 executing program 1: 03:15:33 executing program 5: 03:15:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x96W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 03:15:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) 03:15:33 executing program 1: 03:15:33 executing program 5: 03:15:33 executing program 1: 03:15:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:33 executing program 3: 03:15:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9}}) 03:15:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000100)='sched\x00') writev(r1, &(0x7f0000000500)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="80", 0x1}], 0x4) 03:15:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) write$evdev(r0, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) 03:15:33 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) 03:15:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:33 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r3, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081806) sendfile(r1, r3, 0x0, 0x20020102000007) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) clone(0x800002502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r5, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRESOCT=r0]], 0x1) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$unix(r2, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) 03:15:33 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 03:15:33 executing program 3: 03:15:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:33 executing program 5: 03:15:33 executing program 3: 03:15:33 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:36 executing program 0: 03:15:36 executing program 3: 03:15:36 executing program 5: 03:15:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:36 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:36 executing program 1: 03:15:36 executing program 3: 03:15:36 executing program 1: 03:15:36 executing program 5: 03:15:36 executing program 0: 03:15:36 executing program 3: 03:15:36 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x0) 03:15:36 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000005) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f00000015c0)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c0d0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d1800000000c8846ea512a8ccae7a99da8dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be3e95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13234801df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1af81fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b781dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b302a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d607fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c1829a6030f4a895a56b8d141f743c9189a71387993f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f0c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7d12ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48f01000080ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c58fdaabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076a25f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c8614a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841910600000059d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934b1a4bfdd990b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d3803005739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f024a2a622f5641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6693ee1b9abb5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e63cdd8c29d4e85011e4ba4f00000000954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8217cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096871b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057148d66e5df04b7b734e80957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fa8e86adafa93f218fdf5019c09292858acd8ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8fce6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d29428010000000000000062fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f77294dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b5b6821986d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f77b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eead7b43d1f3960dd283218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f8c83b80c67014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff00", 0x1000}, 0x1006) ioperm(0x0, 0x0, 0x0) 03:15:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000008000000000000000000850000002c000000950000000000000096c4ab83c4fc5dc3d4d20c678d891fe9227304482c"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0a0043d01d25b666cd783f4b8e1c", 0x0}, 0x28) 03:15:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:36 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000003c0), &(0x7f0000000200)=0x4) fcntl$setflags(r0, 0x2, 0x1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000100)={0x0, 0x6, 0x3f}) fchmodat(r0, &(0x7f0000000180)='./file0\x00', 0x100) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() r2 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000900)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xffffffffffffffb9) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a00)={r1, 0x28, &(0x7f0000000980)}, 0xffffffffffffffdf) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'sit0\x00', 0x4}, 0x18) socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000040)={0x5, 0xffffffffffff9436, 0xfffffffffffffffc}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, 0x0, 0x0) getpgid(r2) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000080)=0x9) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r4 = syz_open_dev$mice(&(0x7f00000008c0)='/dev/input/mice\x00', 0x0, 0x2002) ioctl$UI_DEV_DESTROY(r4, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x1000000000000079) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 03:15:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, 0x0) 03:15:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:36 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:36 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:36 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:37 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) 03:15:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) 03:15:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) 03:15:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 03:15:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 03:15:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 03:15:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) 03:15:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x0) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) 03:15:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) 03:15:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) 03:15:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) 03:15:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xc9, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1c"}, 0x1e1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xc9, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1c"}, 0x1e1) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) 03:15:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:41 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:41 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:42 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0x0, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:42 executing program 3 (fault-call:3 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:15:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) 03:15:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:42 executing program 1 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r1, r2, 0x0, 0x1) [ 666.740498] FAULT_INJECTION: forcing a failure. [ 666.740498] name failslab, interval 1, probability 0, space 0, times 0 [ 666.855228] CPU: 0 PID: 21593 Comm: syz-executor.3 Not tainted 4.14.138 #34 [ 666.862376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.871744] Call Trace: [ 666.874343] dump_stack+0x138/0x19c [ 666.877984] should_fail.cold+0x10f/0x159 [ 666.882147] should_failslab+0xdb/0x130 [ 666.886649] kmem_cache_alloc_node+0x56/0x780 [ 666.891150] ? lock_acquire+0x16f/0x430 [ 666.895125] ? save_trace+0x290/0x290 [ 666.898929] ? cred_has_capability+0x142/0x290 [ 666.903515] __alloc_skb+0x9c/0x500 [ 666.907144] ? skb_scrub_packet+0x4b0/0x4b0 [ 666.911543] bcsp_recv+0x38a/0x1450 [ 666.915178] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 666.920638] hci_uart_tty_receive+0x1f4/0x4d0 [ 666.925135] ? ldsem_down_read+0x33/0x40 [ 666.929204] ? hci_uart_write_work+0x6b0/0x6b0 [ 666.933796] tty_ioctl+0xded/0x1320 [ 666.937428] ? tty_vhangup+0x30/0x30 [ 666.941250] ? __might_sleep+0x93/0xb0 [ 666.945139] ? __fget+0x210/0x370 [ 666.948601] ? tty_vhangup+0x30/0x30 [ 666.952322] do_vfs_ioctl+0x7ae/0x1060 [ 666.956213] ? selinux_file_mprotect+0x5d0/0x5d0 [ 666.960974] ? lock_downgrade+0x6e0/0x6e0 [ 666.965126] ? ioctl_preallocate+0x1c0/0x1c0 [ 666.969541] ? __fget+0x237/0x370 [ 666.973006] ? security_file_ioctl+0x89/0xb0 [ 666.977428] SyS_ioctl+0x8f/0xc0 [ 666.980807] ? do_vfs_ioctl+0x1060/0x1060 [ 666.983378] kasan: CONFIG_KASAN_INLINE enabled [ 666.984955] do_syscall_64+0x1e8/0x640 [ 666.984971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 666.984993] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 667.001297] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 667.003523] RIP: 0033:0x459829 [ 667.003530] RSP: 002b:00007fe75435bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 667.003546] RAX: ffffffffffffffda RBX: 00007fe75435bc90 RCX: 0000000000459829 [ 667.029038] RDX: 0000000020000000 RSI: 0000000000005412 RDI: 0000000000000003 [ 667.036308] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 667.043669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe75435c6d4 03:15:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcc, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56"}, 0x1e4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 03:15:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) [ 667.044888] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 667.050936] R13: 00000000004c4153 R14: 00000000004d8308 R15: 0000000000000004 [ 667.057157] Modules linked in: [ 667.067612] CPU: 1 PID: 5 Comm: kworker/u4:0 Not tainted 4.14.138 #34 [ 667.074183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.083545] Workqueue: events_unbound flush_to_ldisc [ 667.088644] task: ffff8880a9cc2140 task.stack: ffff8880a9cd0000 [ 667.094700] RIP: 0010:skb_put+0x31/0x1c0 [ 667.098780] RSP: 0018:ffff8880a9cd7b50 EFLAGS: 00010202 [ 667.104140] RAX: dffffc0000000000 RBX: ffff88805b040340 RCX: 0000000000000000 [ 667.111410] RDX: 0000000000000019 RSI: 0000000000000001 RDI: 0000000000000000 [ 667.118677] RBP: ffff8880a9cd7b78 R08: ffff88805b040438 R09: ffffffff88c9bd08 [ 667.125962] R10: ffff8880a9cc2a60 R11: ffff8880a9cc2140 R12: 0000000000000000 [ 667.133226] R13: 0000000000000001 R14: 000000000000000a R15: 00000000000000c8 [ 667.140643] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 667.148863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 667.154733] CR2: 000000000136e308 CR3: 000000005c825000 CR4: 00000000001406e0 [ 667.161996] Call Trace: [ 667.164583] bcsp_recv+0x8ed/0x1450 [ 667.168209] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 667.173745] hci_uart_tty_receive+0x1f4/0x4d0 [ 667.178239] ? hci_uart_write_work+0x6b0/0x6b0 [ 667.182815] tty_ldisc_receive_buf+0x14d/0x1a0 [ 667.187394] tty_port_default_receive_buf+0x73/0xa0 [ 667.192405] flush_to_ldisc+0x1ec/0x400 [ 667.196386] process_one_work+0x863/0x1600 [ 667.200622] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 667.205287] worker_thread+0x5d9/0x1050 [ 667.209266] kthread+0x319/0x430 [ 667.212623] ? process_one_work+0x1600/0x1600 [ 667.217113] ? kthread_create_on_node+0xd0/0xd0 [ 667.221791] ret_from_fork+0x24/0x30 [ 667.225499] Code: 41 56 41 55 41 89 f5 41 54 49 89 fc 4d 8d bc 24 c8 00 00 00 53 e8 c0 c2 8d fc 4c 89 fa 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 4c 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 667.244684] RIP: skb_put+0x31/0x1c0 RSP: ffff8880a9cd7b50 03:15:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000280)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat\x00') write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xcf, 0xaf06, 0x401, 0x8, 0x8000, 0x5, "b6edcce8d76373b085c0b56bed3e105e1c4786ae7b1dee78871f17efdfe2a576b1df83067bc1f0e25c61c988e9ef13fd21a685e507a5c5f4b1160f3035891d3718d7c78c6c9a86b1c4bf1a501c12cc9a5737739ebeef2160d35ddc41a2dba535d9bab4aa393fe49179444840f2df860a15e22cf06c0013bba7841511d65a5d4183e0c8139691f3d6c6ec53da0992afec9669310f65c2538a628ceae01cff9e0e782cd6268bf22b243293a5ca044053bada4011dc24b3b3afda2fb55f89c3bbbf6c0379a87a38df3e1cabbc56e7a16b"}, 0x1e7) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000180)=0x4) shmget(0x1, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x101000, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 03:15:43 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) [ 667.250962] kobject: 'loop0' (ffff888095e6c560): kobject_uevent_env [ 667.257393] kobject: 'loop0' (ffff888095e6c560): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 667.277549] kobject: 'loop5' (ffff8880a4af89e0): kobject_uevent_env [ 667.284310] kobject: 'loop5' (ffff8880a4af89e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:15:43 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r0, r1, 0x0, 0x1) [ 667.301201] kobject: 'loop0' (ffff888095e6c560): kobject_uevent_env [ 667.307684] kobject: 'loop0' (ffff888095e6c560): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 667.329017] kobject: 'nullb0' (ffff8880a3d18c20): kobject_uevent_env [ 667.344714] kobject: 'kvm' (ffff888219f88550): kobject_uevent_env [ 667.376503] kobject: 'nullb0' (ffff8880a3d18c20): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 667.384003] kobject: 'kvm' (ffff888219f88550): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 667.419242] kobject: 'loop4' (ffff8880a4a9e0e0): kobject_uevent_env [ 667.447328] kobject: 'kvm' (ffff888219f88550): kobject_uevent_env [ 667.468088] kobject: 'kvm' (ffff888219f88550): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 667.471512] kobject: 'loop4' (ffff8880a4a9e0e0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 667.524749] kobject: 'loop0' (ffff888095e6c560): kobject_uevent_env [ 667.550677] kobject: 'loop0' (ffff888095e6c560): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 667.595257] kobject: 'loop2' (ffff8880a4a0d7a0): kobject_uevent_env [ 667.624911] kobject: 'loop2' (ffff8880a4a0d7a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 667.750172] Bluetooth: Can't allocate mem for new packet [ 667.772128] kobject: 'nullb0' (ffff8880a3d18c20): kobject_uevent_env [ 667.780216] kobject: 'nullb0' (ffff8880a3d18c20): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 667.803739] kobject: 'loop5' (ffff8880a4af89e0): kobject_uevent_env [ 667.816759] kobject: 'loop5' (ffff8880a4af89e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 667.841091] ---[ end trace cadbf7b9f76f578c ]--- [ 667.845955] Kernel panic - not syncing: Fatal exception [ 667.852302] Kernel Offset: disabled [ 667.856033] Rebooting in 86400 seconds..