Warning: Permanently added '10.128.0.12' (ECDSA) to the list of known hosts. 2020/05/08 15:06:03 fuzzer started 2020/05/08 15:06:03 dialing manager at 10.128.0.105:33175 2020/05/08 15:06:03 syscalls: 2941 2020/05/08 15:06:03 code coverage: enabled 2020/05/08 15:06:03 comparison tracing: enabled 2020/05/08 15:06:03 extra coverage: extra coverage is not supported by the kernel 2020/05/08 15:06:03 setuid sandbox: enabled 2020/05/08 15:06:03 namespace sandbox: enabled 2020/05/08 15:06:03 Android sandbox: enabled 2020/05/08 15:06:03 fault injection: enabled 2020/05/08 15:06:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/08 15:06:03 net packet injection: enabled 2020/05/08 15:06:03 net device setup: enabled 2020/05/08 15:06:03 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/08 15:06:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/08 15:06:03 USB emulation: /dev/raw-gadget does not exist 15:08:22 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x7ffe, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="5500000018007f7d00fe01b2a4a280930a600000fc000002910000003900090020000c0003", 0x25}], 0x1}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 179.180679] audit: type=1400 audit(1588950502.811:9): avc: denied { execmem } for pid=6462 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 179.307613] IPVS: ftp: loaded support on port[0] = 21 15:08:23 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 179.492280] chnl_net:caif_netlink_parms(): no params data found [ 179.591257] IPVS: ftp: loaded support on port[0] = 21 15:08:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) [ 179.685115] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.692281] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.700546] device bridge_slave_0 entered promiscuous mode [ 179.708851] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.715241] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.724460] device bridge_slave_1 entered promiscuous mode [ 179.754150] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.770148] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.874441] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.887460] team0: Port device team_slave_0 added [ 179.922959] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.932436] team0: Port device team_slave_1 added [ 179.942081] chnl_net:caif_netlink_parms(): no params data found [ 179.966734] IPVS: ftp: loaded support on port[0] = 21 [ 180.010156] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 180.019656] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:08:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) setresgid(0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0x48) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = getpid() getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000100)) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x7ff, 0x100, 0x0, 0x0, r1, 0x0, 0x1000}) keyctl$setperm(0x5, r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40), 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 180.050628] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 180.079010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 180.085276] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.115796] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 180.146907] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.155473] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.220413] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.228683] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.239315] device bridge_slave_0 entered promiscuous mode [ 180.273719] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.288186] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.303573] device bridge_slave_1 entered promiscuous mode [ 180.331981] device hsr_slave_0 entered promiscuous mode 15:08:24 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 180.376907] device hsr_slave_1 entered promiscuous mode [ 180.417647] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 180.425008] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 180.474611] IPVS: ftp: loaded support on port[0] = 21 [ 180.606658] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.628383] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.639316] chnl_net:caif_netlink_parms(): no params data found 15:08:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setresgid(0x0, 0x0, 0x0) keyctl$read(0x3, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 180.753114] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.770684] team0: Port device team_slave_0 added [ 180.779381] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.797847] team0: Port device team_slave_1 added [ 180.857306] IPVS: ftp: loaded support on port[0] = 21 [ 180.911765] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 180.914166] IPVS: ftp: loaded support on port[0] = 21 [ 180.918635] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.948652] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 180.979837] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 180.986713] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.012732] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.024220] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.048356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.140286] device hsr_slave_0 entered promiscuous mode [ 181.176930] device hsr_slave_1 entered promiscuous mode [ 181.236945] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 181.264829] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.271622] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.280337] device bridge_slave_0 entered promiscuous mode [ 181.288597] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 181.321423] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.328712] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.335758] device bridge_slave_1 entered promiscuous mode [ 181.353090] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 181.440802] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.449878] chnl_net:caif_netlink_parms(): no params data found [ 181.514415] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.584279] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.593735] team0: Port device team_slave_0 added [ 181.611925] chnl_net:caif_netlink_parms(): no params data found [ 181.641550] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.651067] team0: Port device team_slave_1 added [ 181.750069] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.757480] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.764547] device bridge_slave_0 entered promiscuous mode [ 181.791370] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 181.798054] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.824440] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 181.854074] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.864670] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 181.871785] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.879349] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.886543] device bridge_slave_1 entered promiscuous mode [ 181.904340] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.910881] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.938703] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.952581] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.963985] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 181.981378] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.995869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.010971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.021760] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 182.028621] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.034835] chnl_net:caif_netlink_parms(): no params data found [ 182.045959] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.063388] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.094088] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.139725] device hsr_slave_0 entered promiscuous mode [ 182.176704] device hsr_slave_1 entered promiscuous mode [ 182.237265] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 182.244605] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 182.254430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.262495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.270487] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.277179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.284610] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.293248] team0: Port device team_slave_0 added [ 182.339730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.348717] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.356043] team0: Port device team_slave_1 added [ 182.369627] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.385892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.407376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.415502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.424761] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.431181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.439028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.448462] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.469518] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 182.475818] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 182.505726] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 182.519948] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 182.526210] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 182.552135] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 182.564818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 182.572205] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.578628] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.585787] device bridge_slave_0 entered promiscuous mode [ 182.595825] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.602974] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.610481] device bridge_slave_1 entered promiscuous mode [ 182.631288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.640724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.648889] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 182.660548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 182.675556] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.693316] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.702550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.715659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.724028] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.769177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 182.819185] device hsr_slave_0 entered promiscuous mode [ 182.857072] device hsr_slave_1 entered promiscuous mode [ 182.930308] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.937272] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.944457] device bridge_slave_0 entered promiscuous mode [ 182.952222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.961337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.974495] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 182.981776] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.990679] team0: Port device team_slave_0 added [ 182.997642] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.005028] team0: Port device team_slave_1 added [ 183.010488] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.017121] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.024213] device bridge_slave_1 entered promiscuous mode [ 183.044947] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 183.053486] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 183.081433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.089461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.110692] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 183.125028] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.136031] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.154498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.162424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.175776] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 183.183520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.191978] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.198572] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.224108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.240633] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.246937] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.272692] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.288674] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.297536] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.357007] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 183.364389] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.373517] team0: Port device team_slave_0 added [ 183.382321] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.390454] team0: Port device team_slave_1 added [ 183.418840] device hsr_slave_0 entered promiscuous mode [ 183.476614] device hsr_slave_1 entered promiscuous mode [ 183.520744] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 183.529376] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 183.539534] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.547045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.567716] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 183.600479] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.606930] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.633012] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.645159] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.651788] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.678287] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.702459] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.721465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.729278] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.737753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.799086] device hsr_slave_0 entered promiscuous mode [ 183.826908] device hsr_slave_1 entered promiscuous mode [ 183.869888] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 183.918431] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 183.979538] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.995741] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 184.017653] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.038186] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.058405] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.068350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.075278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.085469] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 184.102592] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.116448] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 184.122626] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.129349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.140960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.179893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.203323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.213569] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.224422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.236767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.244367] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.250863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.258939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.272286] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.284023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.299042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.309371] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.319634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.332892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.342303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.351440] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.357877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.364910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.377981] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 184.385055] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 184.392121] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 184.403311] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 184.409554] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.419062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.430213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.448355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.456701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.464523] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.470929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.478433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.487592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.499910] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.511097] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 184.521588] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.532686] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.541436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.549830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.557845] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.564193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.572244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.579925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.588138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.595888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.606104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.616252] device veth0_vlan entered promiscuous mode [ 184.628432] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.635602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.643447] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.651536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.663550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.673520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.690113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 184.697941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.710377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.718715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.727753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.735379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.761631] device veth1_vlan entered promiscuous mode [ 184.772961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 184.783584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.796034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.805111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.819115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.827561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.836654] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.846678] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 184.853266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.876275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.887750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.902915] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.910691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.921776] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.932719] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.949667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.958125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.966092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.975604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.985468] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.000158] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 185.011211] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 185.018997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.029959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.038507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.046282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.059790] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 185.065975] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.075559] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 185.087441] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 185.098831] device veth0_macvtap entered promiscuous mode [ 185.105227] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 185.115724] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.125650] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 185.133209] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.140356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.149669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.157729] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.164456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.171609] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 185.182105] device veth1_macvtap entered promiscuous mode [ 185.189176] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 185.199744] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 185.218675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 185.230526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.241374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.254606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.261385] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 185.269846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.278805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.286973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.294857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.304051] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.310479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.317531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.325346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.333356] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.340055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.350250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.360046] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.370807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.381013] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.387857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.395075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.403368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.411540] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.417985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.425431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.434137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.443554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 185.452716] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 185.459910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.481837] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 185.493094] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 185.501449] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 185.513571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.523215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.534807] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 185.541930] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 185.550284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.558685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.566702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.574327] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.580741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.588145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.600530] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 185.614219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.626001] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.635269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.647408] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.658733] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.665394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.673821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.682013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.690914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.698064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.704969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.713109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.721430] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.728735] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.735472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.747355] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 185.754218] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 185.768257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.778304] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 185.784376] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.801080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.809904] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 185.821498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.830720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.841091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.849996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.863333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.877290] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.893716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.912802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.921396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.934585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.943389] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.958313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 185.969230] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.979047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.993613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.001756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.010194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.019677] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.026028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.033775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.043013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 186.052583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 186.063283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 186.074819] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 186.088575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.096795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.104333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.112283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.130333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.138441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.146461] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.152819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.160132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.170421] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 186.176760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.188079] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 186.195452] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 186.204023] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 186.212138] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 186.223037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 186.244184] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 186.255204] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 186.266142] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.278578] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 186.284616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.292812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.302106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.310550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.320718] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 186.330010] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 186.347853] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 186.369242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 186.379645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.388308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.396777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.404204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.412760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.419678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.427687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.436100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.444079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.451252] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.458585] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.468050] device veth0_vlan entered promiscuous mode [ 186.479117] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.488321] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.500738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 186.509571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.520037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.529980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.545273] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.562885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 186.573793] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.590245] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 186.598616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.608608] device veth1_vlan entered promiscuous mode [ 186.615503] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 186.623451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 186.631681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.639936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.649945] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 186.660820] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 186.679745] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 186.689197] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 186.701086] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 186.719399] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 186.727335] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.734235] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.747859] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.754954] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.765076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.785780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.795710] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 186.811297] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 186.820189] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 186.830179] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 186.842585] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 186.854106] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 186.863567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.873212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.881796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.889692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.901171] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.942200] device veth0_vlan entered promiscuous mode [ 186.951600] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.980537] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 187.010123] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 187.018609] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 187.025672] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 187.038015] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 187.050746] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 187.060952] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 187.069780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.080012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.091016] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 187.101096] device veth1_vlan entered promiscuous mode [ 187.109453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 187.117872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.125869] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.133879] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.145754] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 187.158521] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 187.167937] device veth0_vlan entered promiscuous mode [ 187.175108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 187.191788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.203938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 187.213557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.230330] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 187.237899] device veth0_macvtap entered promiscuous mode [ 187.244222] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 187.255780] device veth1_vlan entered promiscuous mode [ 187.262694] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 187.274780] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 187.284491] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 187.294438] device veth1_macvtap entered promiscuous mode [ 187.303733] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 187.314932] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 187.323761] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.331237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 187.339136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 187.347685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.355516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.371799] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 187.384259] device veth0_macvtap entered promiscuous mode [ 187.398420] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 187.414181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 187.441623] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 187.449353] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 187.457872] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 187.465434] device veth1_macvtap entered promiscuous mode [ 187.472917] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 187.481620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 187.491305] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 187.508708] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 187.515917] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 187.523573] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 187.534908] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready 15:08:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000240)) splice(r4, &(0x7f0000000140)=0x4, 0xffffffffffffffff, &(0x7f0000000180)=0x3f, 0x7, 0x1) accept(r3, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, 0x0, r1}, &(0x7f0000000440)=""/243, 0xf3, 0x0) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) [ 187.542761] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 187.551541] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.559557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.568814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.577881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 187.585380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.622311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.630085] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.643433] device veth0_macvtap entered promiscuous mode [ 187.662427] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 187.670513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 187.680447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.692735] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.703972] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 187.711918] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 187.722144] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 187.735133] device veth1_macvtap entered promiscuous mode [ 187.742722] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 187.750124] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 187.758391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.765572] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.775147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.783412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 187.791803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.799846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.807248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.815718] device veth0_vlan entered promiscuous mode [ 187.823082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.834337] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.845308] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 187.854467] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 187.863215] device veth0_vlan entered promiscuous mode [ 187.886405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 187.894217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.913220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 187.923641] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 187.942958] device veth1_vlan entered promiscuous mode 15:08:31 executing program 0: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) socket(0x0, 0x800000003, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'security.', '!]*mime_typemime_type\x00'}) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0xe}) [ 187.965254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 188.001820] hrtimer: interrupt took 27328 ns [ 188.019755] device veth1_vlan entered promiscuous mode [ 188.037227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.061752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.071632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.082577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.095916] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 188.103560] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.127449] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.137182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.161049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.172106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.184334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.195066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.204828] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.214932] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:08:31 executing program 0: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) socket(0x0, 0x800000003, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'security.', '!]*mime_typemime_type\x00'}) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0xe}) [ 188.227158] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 188.234841] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.256046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.266342] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.275458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.287844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.299464] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 188.309250] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 188.319636] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 188.329947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.342778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.354377] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.365703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.376257] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.386058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.397511] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 188.404517] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 188.417431] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 188.424397] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.436426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.450196] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.465278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 188.474605] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.483822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 188.504126] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 188.520033] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready 15:08:32 executing program 0: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) socket(0x0, 0x800000003, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'security.', '!]*mime_typemime_type\x00'}) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0xe}) [ 188.533468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 188.552340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.561895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 188.571026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.601978] device veth0_macvtap entered promiscuous mode [ 188.626356] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 188.665319] device veth0_macvtap entered promiscuous mode [ 188.672391] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 188.685296] device veth1_macvtap entered promiscuous mode [ 188.692839] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 188.709258] device veth1_macvtap entered promiscuous mode [ 188.721096] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 188.746601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready 15:08:32 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x10001b4, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 188.789188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 188.818291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 188.853445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.867202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.881509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.893242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.904169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.920466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.930072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.940094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.955838] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 188.965246] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.980425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 189.004502] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.017882] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.022681] XFS (loop0): Mounting V4 Filesystem [ 189.032135] XFS (loop0): totally zeroed log [ 189.038802] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x17d/0x550, xfs_agi block 0x2 [ 189.044140] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.056256] XFS (loop0): Unmount and run xfs_repair [ 189.061358] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 189.068359] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.068970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.075543] 00000000f36af6e5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.085552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.092976] 0000000018be0922: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.108069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.118363] 000000003aab10bc: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.118625] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.136219] 00000000d3b3e247: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.138119] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.145920] 00000000c4f9a911: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.161134] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.166436] 000000002b7484ab: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.174149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.184590] 0000000097785dce: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.198253] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.202981] 000000009f385b41: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.215038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.222037] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 189.235745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.240825] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 189.255291] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 189.258682] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 189.264616] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.288925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.335698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.350663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.361413] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.376634] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.386980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.397039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.407111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.417074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.426917] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.439070] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 189.447698] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 189.454334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.466719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.475110] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.485411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.509588] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.540376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.552997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.566919] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.577909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.580115] XFS (loop0): Mounting V4 Filesystem [ 189.589166] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.599137] XFS (loop0): totally zeroed log [ 189.602946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.612103] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x17d/0x550, xfs_agi block 0x2 [ 189.617676] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.630123] XFS (loop0): Unmount and run xfs_repair [ 189.635861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.639899] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 189.650616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.660816] 000000000e498c82: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.667838] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 189.674510] 00000000f7ee234a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.682865] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.699254] 00000000a2b5f707: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.726974] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.735059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.750871] 00000000eca0b5c9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.793038] 00000000d0b8c5ee: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 15:08:33 executing program 1: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$addseals(r2, 0x409, 0x5ee4e806cdf63d48) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r3, 0x4b60, &(0x7f0000000100)={0x0, "235d10e03e4e939ac206bb926fe4ad6a27c8778a552ff428dab10dc8458697a520bf29b94d59890b9af9eb6ac6072255448bc281639d406af2946cb4e71f9ba2aa2fb07e826690349aa33dcbd8db384589b763f5c99f342968f2fdf4d5d90f0f1d0e5f504531e2705306528962ae39157be066be35f73c53e61352db36adfbdfff8a53909546a0edcbb3bbcbddce6e85adbdf4e7a6bf70729d25fc1414b81c450eddbbdcf3fbf7e25d6c1708fa5d3a7f332d6d1671105fe76879d8101cd8d6a8445b80d43760e3bf08ed1d601023b692c256b0291f56efab53519008459ac58ddc82c17cf64a702920f0c8355be940c73a69e745585e9bc52d907b4300b214f69519cd3bb5ca489c519a44ac55e9e8132a696e4deb1f52070fe0deac344b593465ea4e048c24a314ef3d7afeada11f34debdc5e1dcf9bd625df3effe0cc37277d42aa87947f1d85d2c29076bbf17977d197b68794d1e9bad1b9e3a6580540829f51043e29b5c8e0d63f06c47757ecf280c21041d0d4f537903653ce96f1d43de65317bf872e221a26d6a116efb654f7b4e8ae988d0ec1822d88cb2e66c24f459f91b1b677958f41a696f881a9a39454c5665071cce76ba0fac0f32df42a1e80033fae6702ec8b12471d074ca59b09badc22095f5536550daa274ba25279aa292988b7ef7b2f38044b36918c09b533efacf17c4c0c123ae9f50560f5a5519da09"}) fdatasync(r3) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r4, 0x100000003, 0x0, 0x28120001) io_submit(r1, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 189.863394] 0000000076208519: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.910130] 00000000dc89f27b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 189.939325] 000000003775f21e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 15:08:33 executing program 5: syz_emit_ethernet(0x4e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaa02ffffffffffff86dd6008001900180000fe8800000000000000000000000000aafe8000000000000000000000000000000002000000000000048d0000010005020000c20400100000"], 0x0) [ 189.994824] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 190.059039] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 190.077680] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 190.103882] XFS (loop0): Failed to read root inode 0xd88, error 117 15:08:33 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x10001b4, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 15:08:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000027c0)=[{&(0x7f0000000400)=""/4108, 0x100c}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = getpid() r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0xa8000, 0x0) pread64(r3, &(0x7f0000000200)=""/119, 0x77, 0x3f) kcmp(0x0, r2, 0x2, 0xffffffffffffffff, r1) ptrace$peeksig(0x4209, r2, &(0x7f0000000140)={0x5, 0x0, 0x7}, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap$dsp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x4000010, r5, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/tcp6\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1}, 0x10) [ 190.377891] FAT-fs (loop2): invalid media value (0x00) [ 190.402727] FAT-fs (loop2): Can't find a valid FAT filesystem [ 190.508786] XFS (loop0): Mounting V4 Filesystem [ 190.546396] XFS (loop0): totally zeroed log [ 190.579597] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x17d/0x550, xfs_agi block 0x2 [ 190.600781] XFS (loop0): Unmount and run xfs_repair [ 190.621638] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 190.631003] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 190.658815] 00000000dbd9b336: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 190.695080] 00000000a0ca7087: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 190.715098] 00000000178ee402: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 190.735524] 00000000995d899c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 190.748913] 00000000089d9fa4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 190.758643] 000000004a156ae3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 190.768236] 000000001ce7d0af: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 190.778126] 00000000a22130b5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 190.788120] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 15:08:34 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r0 = gettid() tkill(r0, 0x1004000000013) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4a, 0x0, 0x8, 0x0, 0x0, 0x7f, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x14412, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000000)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = creat(0x0, 0x48) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x440080, 0x0) r5 = dup(0xffffffffffffffff) getsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) fsync(r3) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e22, 0x0, @empty, 0x4}, {0xa, 0x4e23, 0xfff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, 0x6, [0x0, 0x81, 0xffffffc1, 0xee, 0x101, 0x100, 0x0, 0xffffffff]}, 0x5c) socket(0x29, 0x0, 0xffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) 15:08:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)={0x30, r6, 0x23f, 0x70bd27, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r6, 0x2, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8080) r7 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mkdirat(r7, &(0x7f0000000100)='./file0\x00', 0x102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7520fcf27fa2ec0369643d", @ANYRESHEX]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000200)) [ 190.801905] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 190.818405] XFS (loop0): Failed to read root inode 0xd88, error 117 15:08:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a5911402a44af9d3b0e7eb5d0834d19ed2b5926bb1d9bdbcbd531a49a4af21db053a81cc727221711f2d6add32817f6240ffc152d269f3530128c25e530db671d44d3a890f8f53bcd1fb28eb88d6a7144f8e5806eb6a6fadb6868a86f9a6e24c4cc2cc616cd7070a4e4249048f8c6a6525f89010bbcd396401f23eb92ade8e8569b2d7c6fca7319f11f78be2762426c4184471f219cc80c3a29a89407033e45a8e90dec0b8ed3574edb1298e4df8cc67f4c97ab0db8d5507a8", @ANYRES16=r1, @ANYBLOB="050400000000000000007e000000"], 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r1, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0xf08}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x6c0}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2}, 0x8040) pipe(&(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xd) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x16a}, 0x20) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/6, 0x6}], 0x3, 0x0, 0x0, 0x0) tkill(r4, 0x33) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 15:08:34 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 15:08:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat$cgroup(r2, &(0x7f0000000080)='syz0\x00', 0x1ff) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvtap0\x00', 0x0}) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f00000000c0)={'netdevsim0\x00', {0x2, 0x4e20, @broadcast}}) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4, 0x0, 0x3}, [@NDA_LLADDR={0xa, 0x2, @random='@\x00\x00\x00\x00\b'}]}, 0x28}}, 0x0) 15:08:34 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x60020, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x4, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r1, 0x2ced, 0x2) r2 = socket$nl_audit(0x10, 0x3, 0x9) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46030501fd010000000000000002003e00080000008a020000000000004000000000000000cd00000000000000040000000001380002000800040004000000006040000000040000000000000081000000000000000900000000000000ff01000000000000ff010000000000000100000000000000d63b8c8d85cc2352f8b0d7c5268d1c9ff915f0ec90294db26e812abaed933e34e805deaf989dd22c2d7925366448c0940b8608fc49631a7b7b7357f12b3fa6d9f682b0f8bd4b5a496458559b28c5df0792ffa57f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a986ca3b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffffffff00"/972], 0x3cc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x288040, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8140, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 15:08:34 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000000)='syz0\x00') [ 191.078255] audit: type=1400 audit(1588950514.711:10): avc: denied { write } for pid=7931 comm="syz-executor.1" name="net" dev="proc" ino=29948 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 15:08:34 executing program 0: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x4, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), &(0x7f0000002000), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$unix(r2, &(0x7f0000000040), &(0x7f0000000100)=0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x37, &(0x7f0000000000)={0x32, 0x1, [], [@pad1, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 191.150794] audit: type=1400 audit(1588950514.731:11): avc: denied { add_name } for pid=7931 comm="syz-executor.1" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 15:08:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffea0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a000000010003b0e00ffffffea00000000000000", @ANYRES32, @ANYBLOB="000000000000000080001200080001007674693674000200700004000300000008000200000000000800030000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08521f7d00030000000000d38f8d9daf309bb40c0ad71d66d591d0ca42e683d83f5878f44051d3352cd4d7e76c0900e54b7f28ce4c2d6495faf199ff03000000000000a6dd3b4a9a9ff3eeb4d244055d81e35553b1c169637bbc218e27360b46933e3400000000000000050000000000000000fdfb809223f13b02ac3703d96f3f217ded2cf92881ca8185d03dea3178788098e0c05b075d9738e340b95f7a0f2d8329dceefc7587690e0641f48717c50f47e782469cb878d4d19801"], 0xa0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r3, &(0x7f0000000400)=@nfc, &(0x7f0000000040)=0x80) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14, r6, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x74, r6, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x1}}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8001, 0x4}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x74}}, 0x24004000) 15:08:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x11c000}) tee(r0, r2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x1c}]}, &(0x7f0000000100)='GPL\x00'}, 0x3b) [ 191.241176] audit: type=1400 audit(1588950514.731:12): avc: denied { create } for pid=7931 comm="syz-executor.1" name="pfkey" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 15:08:35 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000180)='\xf6\xcbc^\x95\x11\x8e\x92 H\xeev1\x8d\xf1Z&\x91\xb0\x16\xa5\xcd|g8\xed\xf1\xea\xc0\xd3L\x0f\xeb\xe6\xf6 \xac\x90\x8d\xf0\xf5\xc7\xef\xc8(c\xc5\xc5=\xfdaG0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setns(r3, 0x8000000) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0xa) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='sessionid\x00') [ 191.414348] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 15:08:35 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000040)=0x3, 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f00000001c0)) exit_group(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYRES16=r7, @ANYRES16, @ANYRES64, @ANYRESDEC=r1, @ANYBLOB="98a4bae5fd178a64cfbdf652f62de3c3b5666d159248c3d6b1d5f1fa9632c48de4e9eb16615897c56b2d988c32b73475fd563f2a68181e1fa00fcb07df8ad2a95b25a4f7a671f960243675c5e555c24e9abb0859638b53a4254479733d4e5cbcd842d46ec64b"], 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x840) [ 191.513483] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 191.583134] syz-executor.4 (7945) used greatest stack depth: 23120 bytes left [ 192.727061] NOHZ: local_softirq_pending 08 15:08:37 executing program 3: perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='geneve0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x2f, 0x97, &(0x7f0000000080)="52b144a7abb8ca39e5ebdf729a52e2cc676f0cc991f78b554d7e5e4d1a2cb707cdf917c693e0b154e249c1b85488a2", &(0x7f00000000c0)=""/151, 0x101, 0x0, 0xe7, 0xe5, &(0x7f00000001c0)="0fbfae51cb0eaafef5f434deae16ad6d2326fdabc4f1363e0a7cf73673e17d2304ee4bd694b1f45ef383c3e5b4d916c5b4ade3c9db5bbe816103e3dccdea1365e9e418dc402561d954c44ace350e30fd6cb3a31c36eb3588f5e0d6727531891196ebe82fec4849bc97e09b8408f4b62f1ce97676d148266264be92eab0d704c942e7fb2dfc60658670c95b526d1a916013e1152077a02f545bc0b59e3ec9024c30f6c18272f55fd6ae15eb287ebb02ca6fe3245c1b4bb7aaed27c4237f942af38888b21d94a8911e956a6734a509bc5d34e53101b7fee1c0230955fbeffb82b6062648d31c74bf", &(0x7f00000002c0)="3ce548b2067afb862d9e2e0b224445663be531c55046d953ad2c95f51de3bb632fca5bc70b3325d291ff49dd8b3ce1c3191833b307d70c202d0309f677addb851ff4ea10f7be4ca29afe28278b01bb4ac08f5938fd1406f0b8d0181bd0b202ba1b130624eb29dce8ad1bb97cb117c8b4f4ab411c87abaa5760e5dbe6e9b2697358330046984492beeccb0b09e37102fdc84264fa3b8a53cc4ad5dd2a7278491edcd5f9018532b0e004da8aed3d2fe2b6009fc4dd28db8233b83b02e14903a9e406fd9638f2f748631b94b56d4cee5461abd69f7de935d3f0488e1a19d3bc9b5b28432bc16d"}, 0x40) 15:08:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x751, 0x81}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYRESHEX=r2], 0x10}}, 0xc8c4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000010200fd000005000500000000000a004872bbb6896209000055781309e3399e593f7710aa00007c201700410000"], 0x70}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x4, 0x0, [], [{0x81, 0x2, 0x3, 0xb06, 0x7, 0x400}, {0xb18, 0x5, 0x2, 0x1216, 0x7, 0x1}], [[], [], [], []]}) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 15:08:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffea0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a000000010003b0e00ffffffea00000000000000", @ANYRES32, @ANYBLOB="000000000000000080001200080001007674693674000200700004000300000008000200000000000800030000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08521f7d00030000000000d38f8d9daf309bb40c0ad71d66d591d0ca42e683d83f5878f44051d3352cd4d7e76c0900e54b7f28ce4c2d6495faf199ff03000000000000a6dd3b4a9a9ff3eeb4d244055d81e35553b1c169637bbc218e27360b46933e3400000000000000050000000000000000fdfb809223f13b02ac3703d96f3f217ded2cf92881ca8185d03dea3178788098e0c05b075d9738e340b95f7a0f2d8329dceefc7587690e0641f48717c50f47e782469cb878d4d19801"], 0xa0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r3, &(0x7f0000000400)=@nfc, &(0x7f0000000040)=0x80) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14, r6, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x74, r6, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x1}}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8001, 0x4}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x74}}, 0x24004000) 15:08:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180), 0x10) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "029200", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x5, 0xa}]}}}}}}}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000140)={'batadv0\x00', r4}) 15:08:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x3, &(0x7f0000000240)=[{&(0x7f0000000340)="5d7100fa4ae38ad942d98470a6fcf8b9fedee2a1c48e76d3ddde5d7ee400000000000000faef92041cf7c41bf698997ade84670b559fe196c31f0a74fb52bf1b610ed0239db56bff89b9e8c7b77e7d1cb5eb095120e4a1ecebb9c6eeab4d15506f0a048ebfc00cc5f93a4b30ffab92b40244d9a3db201c005a8a0da0edbe6d1937a324f41b23a82eb2fe19f8fe675a1a4f22f6bae760773345a600"/166, 0xa6, 0xffffffffffffefd0}, {&(0x7f00000002c0)="133e000000000000000000d041336d522a5a5f6c15281c29ef0bf002dddd2a43257fd1baff0bbb5dd7c282da4681a18e6261bb3757ad0eb9f0d3bcc40c7d4530be01d7d5002b", 0x46, 0xffffffff}, {&(0x7f0000000100)="3081f493fdf09cd6477cf79750cabdddc3fb9a3898967b7e6d41d923d548104f97faa3bab326a83d756f7a7b849063711c5076d523e07ef86ae7d81707b45745ad8dd3096cddf1972ca73907378e992b", 0x50, 0x9}], 0x20e0010, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x442d82, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = gettid() tkill(r7, 0x1004000000013) r8 = syz_open_procfs(r7, &(0x7f00000000c0)='net/netlink\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) syz_kvm_setup_cpu$x86(r8, r10, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x38, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup3(r0, r3, 0x80000) 15:08:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000540)='/dev/input/mice\x00', 0x20180) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) [ 193.971527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 194.003002] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 194.070937] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 15:08:37 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4400000010000104004d32000000000000000000", @ANYRES32=0x0, @ANYBLOB="1d00000000000000240012000c00010062726900000008000100e49900009cdc6d7958ebb78e58cab6ab880609de70"], 0x44}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x2f, &(0x7f0000000100)}], 0x492492492492642, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = gettid() tkill(r4, 0x1004000000013) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r6) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={r4, r6, r7}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f00000000c0)={0xc, 0x6, 0x5, 0x8, 0x4, 0x81}) 15:08:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r1, 0x4b60, &(0x7f0000000100)={0x0, "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"}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x80, 0x7}, {0xfffb, 0x8}, {0x5, 0xff}, {0x6, 0x62}]}) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f00000000c0)={0x0, 0x7, 0x9, 0xff, 0x0, "8bead116820dcf6942a09a102fe58fdb13a100", 0xcaacb8f, 0x1}) ioctl$KDSKBSENT(r0, 0x4b60, &(0x7f0000000100)={0x0, "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"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x3ea, 0x5, 0x2a9b, 0x4, 0x6, "7691f933c01130d2584f86a6040f4aca97c5e3"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCGETS(r4, 0x5401, &(0x7f00000003c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40f40, 0x20) 15:08:38 executing program 3: perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='geneve0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x2f, 0x97, &(0x7f0000000080)="52b144a7abb8ca39e5ebdf729a52e2cc676f0cc991f78b554d7e5e4d1a2cb707cdf917c693e0b154e249c1b85488a2", &(0x7f00000000c0)=""/151, 0x101, 0x0, 0xe7, 0xe5, &(0x7f00000001c0)="0fbfae51cb0eaafef5f434deae16ad6d2326fdabc4f1363e0a7cf73673e17d2304ee4bd694b1f45ef383c3e5b4d916c5b4ade3c9db5bbe816103e3dccdea1365e9e418dc402561d954c44ace350e30fd6cb3a31c36eb3588f5e0d6727531891196ebe82fec4849bc97e09b8408f4b62f1ce97676d148266264be92eab0d704c942e7fb2dfc60658670c95b526d1a916013e1152077a02f545bc0b59e3ec9024c30f6c18272f55fd6ae15eb287ebb02ca6fe3245c1b4bb7aaed27c4237f942af38888b21d94a8911e956a6734a509bc5d34e53101b7fee1c0230955fbeffb82b6062648d31c74bf", &(0x7f00000002c0)="3ce548b2067afb862d9e2e0b224445663be531c55046d953ad2c95f51de3bb632fca5bc70b3325d291ff49dd8b3ce1c3191833b307d70c202d0309f677addb851ff4ea10f7be4ca29afe28278b01bb4ac08f5938fd1406f0b8d0181bd0b202ba1b130624eb29dce8ad1bb97cb117c8b4f4ab411c87abaa5760e5dbe6e9b2697358330046984492beeccb0b09e37102fdc84264fa3b8a53cc4ad5dd2a7278491edcd5f9018532b0e004da8aed3d2fe2b6009fc4dd28db8233b83b02e14903a9e406fd9638f2f748631b94b56d4cee5461abd69f7de935d3f0488e1a19d3bc9b5b28432bc16d"}, 0x40) 15:08:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) socket$nl_generic(0x10, 0x3, 0x10) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="53b096b500"], 0x1, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/176) msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/86) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8a, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) 15:08:38 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r4, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x7e) accept4$alg(r5, 0x0, 0x0, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'authenc(sha384-generic,ctr-camellia-aesni-avx2)\x00'}, 0x58) truncate(&(0x7f0000000080)='./bus\x00', 0xfc70) 15:08:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r1, 0x4b60, &(0x7f0000000100)={0x0, "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"}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x80, 0x7}, {0xfffb, 0x8}, {0x5, 0xff}, {0x6, 0x62}]}) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f00000000c0)={0x0, 0x7, 0x9, 0xff, 0x0, "8bead116820dcf6942a09a102fe58fdb13a100", 0xcaacb8f, 0x1}) ioctl$KDSKBSENT(r0, 0x4b60, &(0x7f0000000100)={0x0, "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"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x3ea, 0x5, 0x2a9b, 0x4, 0x6, "7691f933c01130d2584f86a6040f4aca97c5e3"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCGETS(r4, 0x5401, &(0x7f00000003c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40f40, 0x20) 15:08:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) socket$nl_generic(0x10, 0x3, 0x10) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="53b096b500"], 0x1, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/176) msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/86) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8a, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) 15:08:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000540)='/dev/input/mice\x00', 0x20180) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) 15:08:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) socket$nl_generic(0x10, 0x3, 0x10) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="53b096b500"], 0x1, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/176) msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/86) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8a, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) 15:08:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) read(r0, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x82a, @none, 0x1, 0x1}, 0xe) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r5, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c00020005000700050000"], 0x3c}}, 0x0) 15:08:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x1c1803, 0x0) splice(r0, &(0x7f0000000100)=0x2, r1, &(0x7f0000000180)=0x981a, 0xffffffff, 0x1) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)=0xa8) writev(r2, &(0x7f00000003c0)=[{&(0x7f00000017c0)="e0", 0x1}], 0x1) 15:08:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000540)='/dev/input/mice\x00', 0x20180) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) 15:08:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000001, 0x408000) sendmsg$AUDIT_USER_TTY(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20048010}, 0x2000c001) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000300)={0x7, 'veth0_macvtap\x00', {0x2}, 0x1}) write$evdev(0xffffffffffffffff, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0xffffffff, 0x0, 0x0, 0x0, 0x105}, 0x9c) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 15:08:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) socket$nl_generic(0x10, 0x3, 0x10) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="53b096b500"], 0x1, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/176) msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/86) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8a, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) 15:08:40 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() tkill(r0, 0x1004000000013) waitid(0x2, r0, &(0x7f00000000c0), 0x8, &(0x7f0000000140)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x40140921, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0}) 15:08:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) socket$nl_generic(0x10, 0x3, 0x10) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="53b096b500"], 0x1, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/176) msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/86) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8a, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) 15:08:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6d6d69743d617387e37f1f9eca30303030302c0087ef51924faaa1c34ffe2970096645470271a9029004"]) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2000, 0x0) r4 = accept4(r0, 0x0, &(0x7f00000002c0), 0x80000) flistxattr(r4, &(0x7f0000000300)=""/4096, 0x1000) ioctl$sock_rose_SIOCADDRT(r3, 0x890b, &(0x7f0000000180)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x800, @default, @netrom={'nr', 0x0}, 0x83, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f0000000200)={'batadv0\x00', 0x7}) 15:08:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) getpid() unshare(0x2a000400) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockname$packet(r0, &(0x7f00000000c0), &(0x7f0000000240)=0x14) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x2, 0x10000, 0x8001, 0x0, 0x3, "1618aa8c000000000000000000f900", 0x0, 0x2}) r4 = socket$inet(0x2, 0x2, 0x0) sendmmsg$inet(r4, &(0x7f0000000000)=[{{&(0x7f0000002a40)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="284f0000000000896b00000000000000014414110088eaa7a2be991cf00f3029fe84000001000000"], 0x28}}], 0x1, 0x0) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, r5, 0x0, 0x0) fcntl$lock(r4, 0x0, &(0x7f0000000000)={0x2, 0x0, 0x7f, 0x3, r5}) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 15:08:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000140)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r3 = gettid() tkill(r3, 0x1004000000013) r4 = gettid() tkill(r4, 0x1004000000013) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/rt_cache\x00') ioctl$IOC_PR_RESERVE(r5, 0x401070c9, &(0x7f0000000080)={0xfffffffffffffffd, 0x1}) [ 197.264424] EXT4-fs (loop1): Unrecognized mount option "commit=as‡ãžÊ00000" or missing value [ 197.305392] Unknown ioctl 35083 [ 197.391113] Unknown ioctl 35083 15:08:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000540)='/dev/input/mice\x00', 0x20180) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) 15:08:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) socket$nl_generic(0x10, 0x3, 0x10) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="53b096b500"], 0x1, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/176) msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/86) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8a, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) 15:08:41 executing program 5: unshare(0x6c060000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x11c000}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r2, 0x4b60, &(0x7f0000000100)={0x0, "235d10e03e4e939ac206bb926fe4ad6a27c8778a552ff428dab10dc8458697a520bf29b94d59890b9af9eb6ac6072255448bc281639d406af2946cb4e71f9ba2aa2fb07e826690349aa33dcbd8db384589b763f5c99f342968f2fdf4d5d90f0f1d0e5f504531e2705306528962ae39157be066be35f73c53e61352db36adfbdfff8a53909546a0edcbb3bbcbddce6e85adbdf4e7a6bf70729d25fc1414b81c450eddbbdcf3fbf7e25d6c1708fa5d3a7f332d6d1671105fe76879d8101cd8d6a8445b80d43760e3bf08ed1d601023b692c256b0291f56efab53519008459ac58ddc82c17cf64a702920f0c8355be940c73a69e745585e9bc52d907b4300b214f69519cd3bb5ca489c519a44ac55e9e8132a696e4deb1f52070fe0deac344b593465ea4e048c24a314ef3d7afeada11f34debdc5e1dcf9bd625df3effe0cc37277d42aa87947f1d85d2c29076bbf17977d197b68794d1e9bad1b9e3a6580540829f51043e29b5c8e0d63f06c47757ecf280c21041d0d4f537903653ce96f1d43de65317bf872e221a26d6a116efb654f7b4e8ae988d0ec1822d88cb2e66c24f459f91b1b677958f41a696f881a9a39454c5665071cce76ba0fac0f32df42a1e80033fae6702ec8b12471d074ca59b09badc22095f5536550daa274ba25279aa292988b7ef7b2f38044b36918c09b533efacf17c4c0c123ae9f50560f5a5519da09"}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x8031, r2, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x3, 0x5}, 0xc) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000100)={'nat\x00', 0x0, [0x0, 0x2]}, &(0x7f00000000c0)=0x54) 15:08:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) socket$nl_generic(0x10, 0x3, 0x10) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="53b096b500"], 0x1, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/176) msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000003c0)=""/86) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8a, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) [ 198.265745] IPVS: ftp: loaded support on port[0] = 21 15:08:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r4, 0x10f, 0x84, &(0x7f0000000140), &(0x7f0000000240)=0x4) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0], 0x48}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="a51f020000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r10, @ANYBLOB], 0x3c}}, 0x0) fchdir(r8) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7a00, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x11, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8}]}, 0x20}}, 0x0) 15:08:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x400000) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x70, 0x4, 0x6, 0x8, 0xc7, 0x0, 0x6, 0x33000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x800, 0x3, @perf_config_ext={0x3c5, 0x100}, 0x0, 0x4, 0x5, 0x0, 0x0, 0x1}, r2, 0xb, r3, 0xc) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='dax\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000004c0)="ca", 0x1}], 0x1) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5cf294163360c15b6827ede99e34b42612575f2f"], 0x0) 15:08:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000540)='/dev/input/mice\x00', 0x20180) [ 199.234669] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 199.277014] device macvlan2 entered promiscuous mode [ 199.295521] FAT-fs (loop4): bogus number of reserved sectors [ 199.295554] FAT-fs (loop4): Can't find a valid FAT filesystem [ 199.719807] FAT-fs (loop4): bogus number of reserved sectors [ 199.719819] FAT-fs (loop4): Can't find a valid FAT filesystem [ 200.092446] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 200.167118] device macvlan1 entered promiscuous mode [ 200.185669] device veth3 entered promiscuous mode [ 200.209233] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 200.262763] device veth3 left promiscuous mode 15:08:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000540)='/dev/input/mice\x00', 0x20180) 15:08:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="34000000100081eee80f00a4c6a6688f00000000", @ANYRES32=r5, @ANYBLOB="000000140009000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @mcast2}, @IFA_FLAGS={0x8, 0x8, 0x404}]}, 0x34}}, 0x0) 15:08:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x400000) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x70, 0x4, 0x6, 0x8, 0xc7, 0x0, 0x6, 0x33000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x800, 0x3, @perf_config_ext={0x3c5, 0x100}, 0x0, 0x4, 0x5, 0x0, 0x0, 0x1}, r2, 0xb, r3, 0xc) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='dax\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000004c0)="ca", 0x1}], 0x1) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5cf294163360c15b6827ede99e34b42612575f2f"], 0x0) 15:08:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) [ 200.427237] FAT-fs (loop4): bogus number of reserved sectors [ 200.440162] FAT-fs (loop4): Can't find a valid FAT filesystem 15:08:44 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x4e22}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@loopback}, 0x0, @in6=@loopback}}, 0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000180)={0x0, 0x1000, 0x4, r0, 0x0, &(0x7f0000000100)={0x9909d9, 0x3, [], @value=0x3ff}}) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00000003c0)=ANY=[], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r5, &(0x7f00000017c0), 0x3da, 0x2) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) socket$inet6_udp(0xa, 0x2, 0x0) 15:08:44 executing program 4: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000140)=0x1000) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x8008551d, &(0x7f0000000180)={0xe75e, 0x4, [{0xc, 0x1}, {0x0, 0x1}, {0x8}, {0x2, 0x1}]}) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="600184e002000a0000000001000000c98f13", 0x5d, 0x400}, {0x0, 0x0, 0x34f9}, {&(0x7f0000000040)="8b76cd4ad4330fb80f4c22f61fd2b04d6e324cdb353f1956bed237a87a5ab21680af75dd36e24599f3d4a2f458b5b2befe080d3b", 0x34, 0x8}], 0x42000, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x25, 0x0) 15:08:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x14, &(0x7f0000000300)={@mcast2}, 0x20) 15:08:44 executing program 5: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x880}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x1f5, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="c6bbcc7d69de8603a3cff95015734501e88d50a124e1a33bcac4b5dce72d86d17fc7b842271c22c9da5c9e971f00000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x7, 0xf}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0xc, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}]}}]}, 0x3c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 200.714596] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 200.722790] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 201.004528] audit: type=1800 audit(1588950524.631:13): pid=8310 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15786 res=0 15:08:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) [ 201.223941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=8321 comm=syz-executor.5 15:08:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000540)='/dev/input/mice\x00', 0x20180) 15:08:44 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffff00000000000091000900810039000800450000300000000000019078ac1e0001ac1414aa040090780000000045000000b0000000000200000a010100ac1414aa"], 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x202, 0x0) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r6 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r8) ioctl$SIOCAX25GETUID(r6, 0x89e0, &(0x7f0000000200)={0x3, @bcast, r8}) syz_kvm_setup_cpu$x86(r3, r5, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="0f08660f3881953a98edc1c4c1fd50d6c4e2cd9e45150f0fe20c66baa100b893320000efb9160200000f32670fc7b20800f0f710660f28ae9def0000", 0x3c}], 0x1, 0x1, &(0x7f0000000080), 0x0) 15:08:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x0, 0x3, 0x3}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) r8 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 15:08:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) [ 201.370670] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=8323 comm=syz-executor.5 [ 201.741063] audit: type=1804 audit(1588950525.371:14): pid=8346 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir043648078/syzkaller.I92MRF/13/cgroup.controllers" dev="sda1" ino=15822 res=1 15:08:45 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000540)='/dev/input/mice\x00', 0x20180) 15:08:45 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x4e22}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@loopback}, 0x0, @in6=@loopback}}, 0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000180)={0x0, 0x1000, 0x4, r0, 0x0, &(0x7f0000000100)={0x9909d9, 0x3, [], @value=0x3ff}}) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00000003c0)=ANY=[], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r5, &(0x7f00000017c0), 0x3da, 0x2) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) socket$inet6_udp(0xa, 0x2, 0x0) 15:08:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) [ 202.157999] audit: type=1804 audit(1588950525.791:15): pid=8348 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir043648078/syzkaller.I92MRF/13/cgroup.controllers" dev="sda1" ino=15822 res=1 15:08:46 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0x9e0000, 0x5, 0xfffffff9, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9a090f, 0x200, [], @value64=0x7}}) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000000c0)={r3, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r3, 0x7fff, 0xfff}, 0x8) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000000c0), 0x4) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$BATADV_CMD_GET_DAT_CACHE(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x1c, r6, 0x31905e13403123b7, 0x0, 0x0, {0x8, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}]}, 0x1c}, 0x1, 0x50000}, 0x0) sendmsg$BATADV_CMD_TP_METER(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r6, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x68a4a084}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x43}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x3c}}, 0x8004) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 202.159385] audit: type=1804 audit(1588950525.791:16): pid=8346 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir043648078/syzkaller.I92MRF/13/cgroup.controllers" dev="sda1" ino=15822 res=1 15:08:46 executing program 3: semget$private(0x0, 0x20000000102, 0x0) dup(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20233, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x5, 0x0) syz_open_dev$vcsa(0x0, 0xffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c20000000180c200000086dd60e0000000001100fe800000000000000000000000000000ff6cdda5410000000000000000000001498abf154b5914227608446c7ea2e2be80443b7df58e8c52d7131b631ff2945c8d74bcf19ce3e282e872f3c9e66df6910b62686a736d5902ff023bbba29d45275f7ec77000"], 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0xfffffffd, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x87}}}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x20040010) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d0, 0xf0, 0x0, 0xf0, 0xf0, 0xf0, 0x200, 0x200, 0x200, 0x200, 0x200, 0x3, 0x0, {[{{@uncond, 0x3, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'bridge_slave_0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x330) 15:08:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:46 executing program 3: semget$private(0x0, 0x20000000102, 0x0) dup(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20233, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x5, 0x0) syz_open_dev$vcsa(0x0, 0xffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c20000000180c200000086dd60e0000000001100fe800000000000000000000000000000ff6cdda5410000000000000000000001498abf154b5914227608446c7ea2e2be80443b7df58e8c52d7131b631ff2945c8d74bcf19ce3e282e872f3c9e66df6910b62686a736d5902ff023bbba29d45275f7ec77000"], 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0xfffffffd, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x87}}}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x20040010) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d0, 0xf0, 0x0, 0xf0, 0xf0, 0xf0, 0x200, 0x200, 0x200, 0x200, 0x200, 0x3, 0x0, {[{{@uncond, 0x3, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'bridge_slave_0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x330) 15:08:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="20020000100001080200"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x220}}, 0x0) 15:08:47 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1_to_batadv\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000140)={'vlan1\x00', @random="01003a1e2410"}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000080)) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 15:08:47 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0xf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x3, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}) setresuid(0x0, r1, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x80344, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f00000000c0)='./file0\x00', 0x101e00, 0x0) 15:08:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c00020008000100010000004ae1557ca6f4802e4db674f5047d5bf9546f0fb245e0241d3a36a2f270de1fa31db274877efc5b104e6bb0d13cae3c6a07ce61a4dd9477e3aa4bf40c992290b639088b95accc768a1f0e239db247ad41310ff249585d4e8a839adfa3ae9d77e0e06b7d21cbd434e6f980710f67"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r3, @ANYBLOB="443c3d3c034cfa9d683826e7673405fcda2ee6f5182e4522e51baaeb8b90a6f914"], 0x50}}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', r3}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3, 0x0, 0x21849}}, 0x20}}, 0x0) 15:08:47 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) [ 203.162542] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 203.197221] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 203.359301] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 203.451052] netlink: 512 bytes leftover after parsing attributes in process `syz-executor.3'. [ 203.468922] netlink: 512 bytes leftover after parsing attributes in process `syz-executor.3'. [ 203.988049] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 15:08:47 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:48 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:49 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:49 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c00020008000100010000004ae1557ca6f4802e4db674f5047d5bf9546f0fb245e0241d3a36a2f270de1fa31db274877efc5b104e6bb0d13cae3c6a07ce61a4dd9477e3aa4bf40c992290b639088b95accc768a1f0e239db247ad41310ff249585d4e8a839adfa3ae9d77e0e06b7d21cbd434e6f980710f67"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r3, @ANYBLOB="443c3d3c034cfa9d683826e7673405fcda2ee6f5182e4522e51baaeb8b90a6f914"], 0x50}}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', r3}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3, 0x0, 0x21849}}, 0x20}}, 0x0) 15:08:50 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) [ 205.983737] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 206.189880] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 15:08:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:50 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:50 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x5c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="10002dbd7000fedbdf2507000000080002000300000008000c0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x15}, 0x851) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) geteuid() r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000180)) fchdir(r0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000100)) write$P9_RREADLINK(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="2ed8bb0baf398ec4196a5b0ab7ba4074cdbadb0d37ca68625e5405379e73c799138b465d4bc14e69c9a2ed430333fe1c9cab9fcc26db8a00000000000000006ef7644906983e029fff140c3e1b5323e0ab14a3554066d37584b674f5194cab86aaa598c68214527351d200010000b89f74496b2ca689af46d7ef7c18b6fa4fb0f478a7b7019c496b0a1ce4284bd781855da25f96e16e507eef5140f0e5a64dbcae5c3e6daa960e85e2"], 0x9) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000200)={0x21}) sendfile(0xffffffffffffffff, r3, &(0x7f0000000240)=0x8000, 0x20) 15:08:50 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:51 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004000000000000410aa3dbfdcadfdef83ed5d22796fce2e59f03e6b2c8483367845a7fd21697ebcd43160ecf29de2fc5c15237c179d934630f9d0849144f70f903c5cdfacbd843f60a9bd76e8b6928aaace5d391fcc7078c2470538c401d665c76ded80064ff8d692fcd58bf3ae22615b40c63d45e9297b9e01e8c9e659fb07418d366ac6125102077603a2bfcfa837763b3607aabd4ca7818a7841a4e03c3e27bbf1c219718412accabde70953128d57dd3158523566253cd2272be70ce2caa3431d8b073a9c1d64eb4082f18ddd480764249c569547cab2aaef747859f1b3fe169277fa086b1b448f123d5f8b92b503bbf6b099875879e91661b9f4542cf55637b2f7dda3e892a7886607faf4d1afd74c879d3ce004bd2d97f8ffeb85ee0a9c4e0c4f41ee4e9b94d5559ec37137e11ce010a609548921f7c80e077ae4ef343d06954f185fd"], 0x0, 0x26}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000680)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r7, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000014080)={0x18, 0x9, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000003030000000000000006000000180800000600"/51], &(0x7f0000000180)='GPL\x00', 0x2, 0x5e, &(0x7f0000000280)=""/94, 0x41000, 0x7, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000014000)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000014040)={0x3, 0x2, 0x1}, 0x10, r8}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x9, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit, @map={0x18, 0x5, 0x1, 0x0, r3}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x9c, 0x75, &(0x7f0000000180)=""/117, 0x41000, 0x2, [], 0x0, 0xd, r5, 0x8, &(0x7f0000000200)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x10, 0x20, 0x9}, 0x10, r8, r3}, 0x78) write$binfmt_elf64(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/1645], 0x66d) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x343) ioctl$SNDCTL_DSP_GETOPTR(r2, 0x80045017, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0xc0000) 15:08:51 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x5c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="10002dbd7000fedbdf2507000000080002000300000008000c0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x15}, 0x851) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) geteuid() r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000180)) fchdir(r0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000100)) write$P9_RREADLINK(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="2ed8bb0baf398ec4196a5b0ab7ba4074cdbadb0d37ca68625e5405379e73c799138b465d4bc14e69c9a2ed430333fe1c9cab9fcc26db8a00000000000000006ef7644906983e029fff140c3e1b5323e0ab14a3554066d37584b674f5194cab86aaa598c68214527351d200010000b89f74496b2ca689af46d7ef7c18b6fa4fb0f478a7b7019c496b0a1ce4284bd781855da25f96e16e507eef5140f0e5a64dbcae5c3e6daa960e85e2"], 0x9) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000200)={0x21}) sendfile(0xffffffffffffffff, r3, &(0x7f0000000240)=0x8000, 0x20) 15:08:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:51 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) [ 207.582393] audit: type=1804 audit(1588950531.212:17): pid=8517 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir338642836/syzkaller.eF1d3C/13/bus" dev="sda1" ino=15828 res=1 15:08:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:52 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:52 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:52 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:52 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:52 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:52 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:53 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:53 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:53 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:53 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:53 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:53 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:53 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:53 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:53 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:54 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:54 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)) 15:08:54 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:54 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:54 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:55 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:55 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:56 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:56 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:56 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:56 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:56 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:56 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:57 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:57 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:57 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:57 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:57 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:57 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:57 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:57 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:57 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:57 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:58 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:58 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:58 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:58 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:58 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:59 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) 15:08:59 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:08:59 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:08:59 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:08:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:00 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:00 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:00 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:00 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:00 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) 15:09:00 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:00 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:00 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:00 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:00 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) 15:09:00 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:00 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:01 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:01 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:01 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r5, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:01 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:01 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:01 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) 15:09:01 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:01 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:01 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:01 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:01 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r4, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r4, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xffffffffffffff01) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r4, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r4, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:02 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:02 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:02 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:02 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r4, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:02 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:02 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:02 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:02 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:03 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:03 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:03 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:03 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x2, &(0x7f0000000440)='*\x00', r2}, 0x30) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r4, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:03 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:03 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:03 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:03 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:03 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:03 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:03 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:04 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:04 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:04 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:04 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:04 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:04 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:04 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:04 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:04 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:04 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:04 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:05 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:05 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:05 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:05 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:05 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:05 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:05 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:05 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:05 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:06 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:06 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:06 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:06 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:06 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:06 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:06 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:06 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:07 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:07 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:07 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00', r0}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:07 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:07 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:07 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:07 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:07 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00', r0}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:07 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:07 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:07 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:08 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:08 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:08 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:08 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00', r0}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:09 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:09 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:09 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:09 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:09 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:09 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:09 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:09 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:09 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:09 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:10 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:10 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:10 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:10 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:10 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:10 executing program 5: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:10 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:10 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:10 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:10 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:10 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:10 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:10 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:10 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:10 executing program 5: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:11 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:11 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:11 executing program 5: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:11 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:11 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:11 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:11 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:11 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:11 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:11 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:12 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:12 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:12 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:12 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:12 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00', r0}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:12 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:12 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00', r0}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:12 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:12 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:12 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:13 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r0}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00', r0}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:13 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:13 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:13 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:13 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:13 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:13 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:13 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:13 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:13 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:13 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:13 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:13 executing program 0: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:13 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:13 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:14 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:14 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:14 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:14 executing program 0: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:14 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:14 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:14 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:14 executing program 1: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:14 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:14 executing program 0: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:14 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:14 executing program 1: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:14 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:14 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:14 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:15 executing program 1: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:15 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:15 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:15 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:15 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:15 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:15 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:15 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:15 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:15 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:15 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:15 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:15 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:15 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:15 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:15 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:15 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:15 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:15 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:16 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:16 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:16 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:16 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:16 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:16 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:16 executing program 3: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:16 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:16 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:16 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:16 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:16 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:16 executing program 3: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:16 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:16 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:17 executing program 3: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:17 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:17 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:17 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:17 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:17 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:17 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:17 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:18 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:18 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:18 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:18 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:18 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:18 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:18 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:18 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:18 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:18 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:18 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:19 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r3, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:19 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:19 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:19 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:19 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:19 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:19 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:19 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:19 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:19 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:19 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:20 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:20 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:20 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:20 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:20 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:20 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:20 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:20 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:21 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:21 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:21 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:21 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:21 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:21 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:21 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:22 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:22 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:22 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:22 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:22 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:22 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:22 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:22 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:22 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:22 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:23 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:23 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:23 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:23 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:23 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:23 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:23 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:24 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:24 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:24 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:24 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:24 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:24 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:24 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:24 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r1, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:24 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:24 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:24 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:24 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:24 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r1, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:25 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:25 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r1, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:25 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:25 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:25 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:25 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:25 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:25 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:26 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:26 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:26 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:26 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:26 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:26 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:26 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:26 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:26 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:26 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:26 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:26 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:26 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:26 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:26 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:26 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:26 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00', r1}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffff01) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:27 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:27 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:27 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:27 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:27 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffff01) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:27 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:27 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:27 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:27 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 15:09:28 executing program 4: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(0x0, 0x18, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 15:09:28 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 15:09:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ffff00", @ANYRES16=r2, @ANYBLOB="3f0227bd76003f00000001000000000000230b0000000014001462726f6164636173742d6c696e6b0000725cbe3f214fcc896de6ea247591afcc7ae425c3559dda3e06c136f4517d66622810088d29e8c5f53f501191571e671fdbe78229e7cf946d28"], 0x30}, 0x1, 0xfffffff0}, 0x0) 15:09:28 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x18, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xa4, 0x62, &(0x7f0000000200)="95d18cc76a44cf756cc018a4383977ee0dd1f24d28a70da797301dfea447af6d7bf934cdb3ce359609f53e02a37d21246698a969400877e6ced78772f730426ee7fc08018e9c77148b3de2fea8af0d7e1c992e5fef0c47785bbfe5528ca1c8abd2ef9108cd7732cebe30c1b894591b371c466797ac24a607f45400fc1b51344a32b42f568f53382b037179c5c0e74c462d0f1f7ce8c3ac6e0bb5fcde2d8c41b3fbfbb1c5", &(0x7f0000000100)=""/98, 0x6, 0x0, 0x1e, 0xba, &(0x7f00000002c0)="8accc84ae798cbaf5f9245d885279b84a3dc1e53c04b3d85ccac2c171a3e", &(0x7f0000000300)="208620f11b1d129582d6d801fe347ff65ac328231efc3727a52d39fb85e0c07e0271f27c1a41d29b2df75af4f6f988fe0ac7e4538b50f7b809077c661a8be385f7d3c0818f695740b754b95d0d584170af82e3379dbe49bf08f7e0030997d728fd452b807410528549ffdaa5140ba32c46222319f56140f464346363d00e51cc73bd3e76976b0c063ff04ff5e70454fdeec68e635c96138b62ca07252056f358cb560429e320637af3c7f74e5a76fa5b8aba53086e0d4e5a1bd7"}, 0x40) 15:09:28 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffffffffff01) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 15:09:28 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000440)='*\x00'}, 0x30) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4b0, 0x0, 0x2, 0x4, 0x0, {}, {}, {0x2}, {0xffffffff}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=""/18, 0x12) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 272.720410] NOHZ: local_softirq_pending 08 [ 274.000633] NOHZ: local_softirq_pending 08 [ 313.676765] NOHZ: local_softirq_pending 08 [ 315.596707] NOHZ: local_softirq_pending 08 [ 334.155555] NOHZ: local_softirq_pending 08 [ 353.995203] NOHZ: local_softirq_pending 08 [ 392.391851] INFO: task syz-executor.3:10532 blocked for more than 140 seconds. [ 392.391863] Not tainted 4.19.121-syzkaller #0 [ 392.391869] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 392.391876] syz-executor.3 D27648 10532 6779 0x00000004 [ 392.391897] Call Trace: [ 392.391962] ? __schedule+0x866/0x1d80 [ 392.392067] ? __mutex_lock+0x721/0x1300 [ 392.392087] ? firmware_map_remove+0x19a/0x19a [ 392.392103] ? lock_downgrade+0x740/0x740 [ 392.392125] schedule+0x8d/0x1b0 [ 392.392141] schedule_preempt_disabled+0xf/0x20 [ 392.392155] __mutex_lock+0x726/0x1300 [ 392.392199] ? fb_open+0xd3/0x430 [ 392.392218] ? mutex_trylock+0x1a0/0x1a0 [ 392.392238] ? __mutex_unlock_slowpath+0xea/0x670 [ 392.392261] ? check_memory_region+0x108/0x180 [ 392.392278] ? fb_open+0xd3/0x430 [ 392.392289] fb_open+0xd3/0x430 [ 392.392305] ? get_fb_info.part.0+0x80/0x80 [ 392.392317] chrdev_open+0x219/0x5c0 [ 392.392332] ? cdev_put.part.0+0x50/0x50 [ 392.392347] ? cdev_put.part.0+0x50/0x50 [ 392.392364] do_dentry_open+0x4a8/0x1160 [ 392.392379] ? cdev_put.part.0+0x50/0x50 [ 392.392395] ? security_inode_permission+0xc4/0xf0 [ 392.392408] ? chown_common+0x550/0x550 [ 392.392424] ? inode_permission+0xaf/0x550 [ 392.392445] path_openat+0x1031/0x4200 [ 392.392480] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 392.392507] do_filp_open+0x1a1/0x280 [ 392.392521] ? may_open_dev+0xf0/0xf0 [ 392.392533] ? find_held_lock+0x2d/0x110 [ 392.392555] ? lock_downgrade+0x740/0x740 [ 392.392613] ? find_next_zero_bit+0x108/0x130 [ 392.392627] ? __sanitizer_cov_trace_pc+0x2e/0x50 [ 392.392644] ? do_raw_spin_unlock+0x171/0x260 [ 392.392657] ? _raw_spin_unlock+0x29/0x40 [ 392.392671] ? __alloc_fd+0x43c/0x550 [ 392.392692] do_sys_open+0x3c0/0x500 [ 392.392707] ? filp_open+0x70/0x70 [ 392.392724] ? __ia32_sys_clock_settime+0x260/0x260 [ 392.392740] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.392753] ? trace_hardirqs_off_caller+0x55/0x210 [ 392.392769] ? do_syscall_64+0x21/0x620 [ 392.392787] do_syscall_64+0xf9/0x620 [ 392.392804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.392816] RIP: 0033:0x45c829 [ 392.392831] Code: 08 48 c7 44 24 10 09 00 00 00 e8 02 a1 fa ff 48 8b 44 24 18 48 8b 4c 24 30 48 83 c1 10 48 89 0c 24 48 89 44 24 08 48 c7 44 24 <10> 58 1f 00 00 e8 dd a0 fa ff 48 8b 44 24 18 48 89 44 24 40 48 8b [ 392.392839] RSP: 002b:00007f2e1706fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 392.392852] RAX: ffffffffffffffda RBX: 00000000004f73e0 RCX: 000000000045c829 [ 392.392861] RDX: 0000000000000000 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 392.392869] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 392.392877] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 392.392885] R13: 00000000000007a0 R14: 00000000004ca544 R15: 00007f2e170706d4 [ 392.392910] INFO: task syz-executor.1:10539 blocked for more than 140 seconds. [ 392.392918] Not tainted 4.19.121-syzkaller #0 [ 392.392923] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 392.392929] syz-executor.1 D27648 10539 6578 0x00000004 [ 392.392949] Call Trace: [ 392.392967] ? __schedule+0x866/0x1d80 [ 392.392987] ? __mutex_lock+0x721/0x1300 [ 392.393006] ? firmware_map_remove+0x19a/0x19a [ 392.393020] ? lock_downgrade+0x740/0x740 [ 392.393041] schedule+0x8d/0x1b0 [ 392.393057] schedule_preempt_disabled+0xf/0x20 [ 392.393070] __mutex_lock+0x726/0x1300 [ 392.393085] ? fb_open+0xd3/0x430 [ 392.393104] ? mutex_trylock+0x1a0/0x1a0 [ 392.393124] ? __mutex_unlock_slowpath+0xea/0x670 [ 392.393136] ? find_held_lock+0x2d/0x110 [ 392.393162] ? fb_open+0xd3/0x430 [ 392.393173] fb_open+0xd3/0x430 [ 392.393190] ? get_fb_info.part.0+0x80/0x80 [ 392.393202] chrdev_open+0x219/0x5c0 [ 392.393217] ? cdev_put.part.0+0x50/0x50 [ 392.393235] ? security_file_open+0x162/0x1a0 [ 392.393251] do_dentry_open+0x4a8/0x1160 [ 392.393265] ? cdev_put.part.0+0x50/0x50 [ 392.393280] ? chown_common+0x550/0x550 [ 392.393293] ? may_open.isra.0+0x166/0x310 [ 392.393306] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 392.393327] path_openat+0x1031/0x4200 [ 392.393350] ? _raw_spin_unlock_irq+0x24/0x80 [ 392.393368] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 392.393394] do_filp_open+0x1a1/0x280 [ 392.393407] ? may_open_dev+0xf0/0xf0 [ 392.393420] ? find_held_lock+0x2d/0x110 [ 392.393441] ? lock_downgrade+0x740/0x740 [ 392.393456] ? __lock_is_held+0xad/0x140 [ 392.393472] ? do_raw_spin_unlock+0x171/0x260 [ 392.393486] ? _raw_spin_unlock+0x29/0x40 [ 392.393498] ? __alloc_fd+0x43c/0x550 [ 392.393519] do_sys_open+0x3c0/0x500 [ 392.393534] ? filp_open+0x70/0x70 [ 392.393550] ? __ia32_sys_clock_settime+0x260/0x260 [ 392.393564] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.393577] ? trace_hardirqs_off_caller+0x55/0x210 [ 392.393592] ? do_syscall_64+0x21/0x620 [ 392.393609] do_syscall_64+0xf9/0x620 [ 392.393626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.393635] RIP: 0033:0x45c829 [ 392.393648] Code: 08 48 c7 44 24 10 09 00 00 00 e8 02 a1 fa ff 48 8b 44 24 18 48 8b 4c 24 30 48 83 c1 10 48 89 0c 24 48 89 44 24 08 48 c7 44 24 <10> 58 1f 00 00 e8 dd a0 fa ff 48 8b 44 24 18 48 89 44 24 40 48 8b [ 392.393655] RSP: 002b:00007f134166fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 392.393668] RAX: ffffffffffffffda RBX: 00000000004f73e0 RCX: 000000000045c829 [ 392.393676] RDX: 0000000000000000 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 392.393684] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 392.393692] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 392.393701] R13: 00000000000007a0 R14: 00000000004ca544 R15: 00007f13416706d4 [ 392.393725] INFO: task syz-executor.5:10535 blocked for more than 140 seconds. [ 392.393733] Not tainted 4.19.121-syzkaller #0 [ 392.393738] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 392.393743] syz-executor.5 D27760 10535 6921 0x00000004 [ 392.393762] Call Trace: [ 392.393780] ? __schedule+0x866/0x1d80 [ 392.393795] ? __mutex_lock+0x721/0x1300 [ 392.393814] ? firmware_map_remove+0x19a/0x19a [ 392.393827] ? lock_downgrade+0x740/0x740 [ 392.393848] schedule+0x8d/0x1b0 [ 392.393864] schedule_preempt_disabled+0xf/0x20 [ 392.393877] __mutex_lock+0x726/0x1300 [ 392.393891] ? fb_open+0xd3/0x430 [ 392.393910] ? mutex_trylock+0x1a0/0x1a0 [ 392.393930] ? __mutex_unlock_slowpath+0xea/0x670 [ 392.393942] ? find_held_lock+0x2d/0x110 [ 392.393968] ? fb_open+0xd3/0x430 [ 392.393988] fb_open+0xd3/0x430 [ 392.394004] ? get_fb_info.part.0+0x80/0x80 [ 392.394015] chrdev_open+0x219/0x5c0 [ 392.394030] ? cdev_put.part.0+0x50/0x50 [ 392.394048] ? security_file_open+0x162/0x1a0 [ 392.394064] do_dentry_open+0x4a8/0x1160 [ 392.394078] ? cdev_put.part.0+0x50/0x50 [ 392.394093] ? security_inode_permission+0xc4/0xf0 [ 392.394106] ? chown_common+0x550/0x550 [ 392.394119] ? inode_permission+0xaf/0x550 [ 392.394141] path_openat+0x1031/0x4200 [ 392.394171] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 392.394197] do_filp_open+0x1a1/0x280 [ 392.394211] ? may_open_dev+0xf0/0xf0 [ 392.394223] ? find_held_lock+0x2d/0x110 [ 392.394244] ? lock_downgrade+0x740/0x740 [ 392.394259] ? __lock_is_held+0xad/0x140 [ 392.394275] ? do_raw_spin_unlock+0x171/0x260 [ 392.394289] ? _raw_spin_unlock+0x29/0x40 [ 392.394301] ? __alloc_fd+0x43c/0x550 [ 392.394322] do_sys_open+0x3c0/0x500 [ 392.394337] ? filp_open+0x70/0x70 [ 392.394352] ? __ia32_sys_clock_settime+0x260/0x260 [ 392.394367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.394379] ? trace_hardirqs_off_caller+0x55/0x210 [ 392.394394] ? do_syscall_64+0x21/0x620 [ 392.394412] do_syscall_64+0xf9/0x620 [ 392.394429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.394438] RIP: 0033:0x45c829 [ 392.394450] Code: 08 48 c7 44 24 10 09 00 00 00 e8 02 a1 fa ff 48 8b 44 24 18 48 8b 4c 24 30 48 83 c1 10 48 89 0c 24 48 89 44 24 08 48 c7 44 24 <10> 58 1f 00 00 e8 dd a0 fa ff 48 8b 44 24 18 48 89 44 24 40 48 8b [ 392.394457] RSP: 002b:00007f25be693c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 392.394469] RAX: ffffffffffffffda RBX: 00000000004f73e0 RCX: 000000000045c829 [ 392.394477] RDX: 0000000000000000 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 392.394485] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 392.394493] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 392.394501] R13: 00000000000007a0 R14: 00000000004ca544 R15: 00007f25be6946d4 [ 392.394526] INFO: task syz-executor.0:10540 blocked for more than 140 seconds. [ 392.394533] Not tainted 4.19.121-syzkaller #0 [ 392.394538] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 392.394543] syz-executor.0 D27920 10540 6463 0x00000004 [ 392.394563] Call Trace: [ 392.394581] ? __schedule+0x866/0x1d80 [ 392.394596] ? __mutex_lock+0x721/0x1300 [ 392.394615] ? firmware_map_remove+0x19a/0x19a [ 392.394628] ? lock_downgrade+0x740/0x740 [ 392.394650] schedule+0x8d/0x1b0 [ 392.394665] schedule_preempt_disabled+0xf/0x20 [ 392.394679] __mutex_lock+0x726/0x1300 [ 392.394693] ? fb_open+0xd3/0x430 [ 392.394713] ? mutex_trylock+0x1a0/0x1a0 [ 392.394732] ? __mutex_unlock_slowpath+0xea/0x670 [ 392.394745] ? find_held_lock+0x2d/0x110 [ 392.394771] ? fb_open+0xd3/0x430 [ 392.394782] fb_open+0xd3/0x430 [ 392.394797] ? get_fb_info.part.0+0x80/0x80 [ 392.394809] chrdev_open+0x219/0x5c0 [ 392.394823] ? cdev_put.part.0+0x50/0x50 [ 392.394842] ? security_file_open+0x162/0x1a0 [ 392.394857] do_dentry_open+0x4a8/0x1160 [ 392.394871] ? cdev_put.part.0+0x50/0x50 [ 392.394887] ? security_inode_permission+0xc4/0xf0 [ 392.394900] ? chown_common+0x550/0x550 [ 392.394913] ? inode_permission+0xaf/0x550 [ 392.394935] path_openat+0x1031/0x4200 [ 392.394965] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 392.394996] do_filp_open+0x1a1/0x280 [ 392.395009] ? may_open_dev+0xf0/0xf0 [ 392.395022] ? find_held_lock+0x2d/0x110 [ 392.395043] ? lock_downgrade+0x740/0x740 [ 392.395062] ? do_raw_spin_unlock+0x171/0x260 [ 392.395076] ? _raw_spin_unlock+0x29/0x40 [ 392.395088] ? __alloc_fd+0x43c/0x550 [ 392.395109] do_sys_open+0x3c0/0x500 [ 392.395124] ? filp_open+0x70/0x70 [ 392.395139] ? __ia32_sys_clock_settime+0x260/0x260 [ 392.395153] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.395166] ? trace_hardirqs_off_caller+0x55/0x210 [ 392.395181] ? do_syscall_64+0x21/0x620 [ 392.395199] do_syscall_64+0xf9/0x620 [ 392.395216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.395225] RIP: 0033:0x45c829 [ 392.395237] Code: 08 48 c7 44 24 10 09 00 00 00 e8 02 a1 fa ff 48 8b 44 24 18 48 8b 4c 24 30 48 83 c1 10 48 89 0c 24 48 89 44 24 08 48 c7 44 24 <10> 58 1f 00 00 e8 dd a0 fa ff 48 8b 44 24 18 48 89 44 24 40 48 8b [ 392.395245] RSP: 002b:00007efc52e63c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 392.395257] RAX: ffffffffffffffda RBX: 00000000004f73e0 RCX: 000000000045c829 [ 392.395265] RDX: 0000000000000000 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 392.395273] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 392.395281] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 392.395289] R13: 00000000000007a0 R14: 00000000004ca544 R15: 00007efc52e646d4 [ 392.395314] INFO: task syz-executor.2:10542 blocked for more than 140 seconds. [ 392.395321] Not tainted 4.19.121-syzkaller #0 [ 392.395326] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 392.395331] syz-executor.2 D27648 10542 6667 0x00000004 [ 392.395349] Call Trace: [ 392.395367] ? __schedule+0x866/0x1d80 [ 392.395382] ? __mutex_lock+0x721/0x1300 [ 392.395401] ? firmware_map_remove+0x19a/0x19a [ 392.395415] ? lock_downgrade+0x740/0x740 [ 392.395436] schedule+0x8d/0x1b0 [ 392.395452] schedule_preempt_disabled+0xf/0x20 [ 392.395465] __mutex_lock+0x726/0x1300 [ 392.395479] ? fb_open+0xd3/0x430 [ 392.395498] ? mutex_trylock+0x1a0/0x1a0 [ 392.395512] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.395531] ? __mutex_unlock_slowpath+0xea/0x670 [ 392.395557] ? fb_open+0xd3/0x430 [ 392.395569] fb_open+0xd3/0x430 [ 392.395584] ? get_fb_info.part.0+0x80/0x80 [ 392.395595] chrdev_open+0x219/0x5c0 [ 392.395609] ? cdev_put.part.0+0x50/0x50 [ 392.395628] ? security_file_open+0x162/0x1a0 [ 392.395644] do_dentry_open+0x4a8/0x1160 [ 392.395658] ? cdev_put.part.0+0x50/0x50 [ 392.395673] ? security_inode_permission+0xc4/0xf0 [ 392.395686] ? chown_common+0x550/0x550 [ 392.395700] ? inode_permission+0xaf/0x550 [ 392.395721] path_openat+0x1031/0x4200 [ 392.395751] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 392.395777] do_filp_open+0x1a1/0x280 [ 392.395790] ? may_open_dev+0xf0/0xf0 [ 392.395803] ? find_held_lock+0x2d/0x110 [ 392.395824] ? lock_downgrade+0x740/0x740 [ 392.395842] ? do_raw_spin_unlock+0x171/0x260 [ 392.395856] ? _raw_spin_unlock+0x29/0x40 [ 392.395868] ? __alloc_fd+0x43c/0x550 [ 392.395889] do_sys_open+0x3c0/0x500 [ 392.395904] ? filp_open+0x70/0x70 [ 392.395920] ? __ia32_sys_clock_settime+0x260/0x260 [ 392.395934] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.395947] ? trace_hardirqs_off_caller+0x55/0x210 [ 392.395962] ? do_syscall_64+0x21/0x620 [ 392.395985] do_syscall_64+0xf9/0x620 [ 392.396002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.396011] RIP: 0033:0x45c829 [ 392.396023] Code: 08 48 c7 44 24 10 09 00 00 00 e8 02 a1 fa ff 48 8b 44 24 18 48 8b 4c 24 30 48 83 c1 10 48 89 0c 24 48 89 44 24 08 48 c7 44 24 <10> 58 1f 00 00 e8 dd a0 fa ff 48 8b 44 24 18 48 89 44 24 40 48 8b [ 392.396031] RSP: 002b:00007f54eb72bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 392.396043] RAX: ffffffffffffffda RBX: 00000000004f73e0 RCX: 000000000045c829 [ 392.396051] RDX: 0000000000000000 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 392.396059] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 392.396067] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 392.396075] R13: 00000000000007a0 R14: 00000000004ca544 R15: 00007f54eb72c6d4 [ 392.396095] [ 392.396095] Showing all locks held in the system: [ 392.396108] 1 lock held by khungtaskd/1072: [ 392.396113] #0: 000000009328c769 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 392.396168] 1 lock held by in:imklog/6200: [ 392.396172] #0: 0000000092188d70 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xe3/0x100 [ 392.396205] 3 locks held by syz-executor.4/10529: [ 392.396214] 1 lock held by syz-executor.3/10532: [ 392.396218] #0: 00000000ae65de51 (&fb_info->lock){+.+.}, at: fb_open+0xd3/0x430 [ 392.396245] 1 lock held by syz-executor.1/10539: [ 392.396249] #0: 00000000ae65de51 (&fb_info->lock){+.+.}, at: fb_open+0xd3/0x430 [ 392.396275] 1 lock held by syz-executor.5/10535: [ 392.396279] #0: 00000000ae65de51 (&fb_info->lock){+.+.}, at: fb_open+0xd3/0x430 [ 392.396305] 1 lock held by syz-executor.0/10540: [ 392.396309] #0: 00000000ae65de51 (&fb_info->lock){+.+.}, at: fb_open+0xd3/0x430 [ 392.396335] 1 lock held by syz-executor.2/10542: [ 392.396339] #0: 00000000ae65de51 (&fb_info->lock){+.+.}, at: fb_open+0xd3/0x430 [ 392.396361] [ 392.396366] ============================================= [ 392.396366] [ 392.396373] NMI backtrace for cpu 1 [ 392.396386] CPU: 1 PID: 1072 Comm: khungtaskd Not tainted 4.19.121-syzkaller #0 [ 392.396394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.396398] Call Trace: [ 392.396468] dump_stack+0x188/0x20d [ 392.396484] nmi_cpu_backtrace.cold+0x63/0xa2 [ 392.396501] ? lapic_can_unplug_cpu.cold+0x44/0x44 [ 392.396514] nmi_trigger_cpumask_backtrace+0x1a6/0x1eb [ 392.396528] watchdog+0x962/0xe40 [ 392.396547] ? reset_hung_task_detector+0x30/0x30 [ 392.396562] kthread+0x34a/0x420 [ 392.396577] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 392.396592] ret_from_fork+0x24/0x30 [ 392.396614] Sending NMI from CPU 1 to CPUs 0: [ 392.397279] NMI backtrace for cpu 0 [ 392.397285] CPU: 0 PID: 10529 Comm: syz-executor.4 Not tainted 4.19.121-syzkaller #0 [ 392.397291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.397295] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x50 [ 392.397305] Code: 65 8b 15 1c 24 9a 7e 81 e2 00 01 1f 00 75 2b 8b 90 d8 12 00 00 83 fa 02 75 20 48 8b 88 e0 12 00 00 8b 80 dc 12 00 00 48 8b 11 <48> 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 0f 1f 84 00 00 [ 392.397309] RSP: 0018:ffff8880426ff250 EFLAGS: 00000246 [ 392.397316] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000e2e8000 [ 392.397321] RDX: 000000000003ffff RSI: ffffffff837786f7 RDI: 0000000000000007 [ 392.397326] RBP: ffff8882197dd200 R08: ffff88808bade200 R09: 0000000000000040 [ 392.397330] R10: ffffed10432d89f3 R11: ffff8882196c4f9f R12: ffff8880000a0000 [ 392.397335] R13: 00000000a7d282f5 R14: 00000000a7d282f5 R15: 0000000000000000 [ 392.397340] FS: 00007f78ca7b1700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 392.397344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 392.397349] CR2: 00007f99b20da000 CR3: 000000009e23a000 CR4: 00000000001406f0 [ 392.397353] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 392.397358] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 392.397360] Call Trace: [ 392.397363] cfb_fillrect+0x3e7/0x7a0 [ 392.397366] ? cfb_fillrect+0x7a0/0x7a0 [ 392.397370] vga16fb_fillrect+0x68f/0x1960 [ 392.397372] ? memcpy+0x35/0x50 [ 392.397376] bit_clear_margins+0x2d5/0x4a0 [ 392.397379] ? bit_bmove+0x210/0x210 [ 392.397382] ? vesafb_probe.cold+0x1082/0x1082 [ 392.397385] fbcon_clear_margins+0x2d8/0x370 [ 392.397388] fbcon_switch+0xe0f/0x1970 [ 392.397392] ? fbcon_set_def_font+0x370/0x370 [ 392.397395] ? fbcon_cursor+0x572/0x760 [ 392.397398] ? bit_clear+0x4e0/0x4e0 [ 392.397401] ? fbcon_set_origin+0x26/0x50 [ 392.397404] redraw_screen+0x37d/0x870 [ 392.397407] ? vesafb_probe.cold+0x1082/0x1082 [ 392.397410] ? con_flush_chars+0x90/0x90 [ 392.397414] ? fbcon_set_palette+0x4c6/0x5e0 [ 392.397417] fbcon_modechanged+0x5eb/0x8f0 [ 392.397420] fbcon_event_notify+0x1b2/0x1d54 [ 392.397424] ? lock_acquire+0x170/0x400 [ 392.397427] notifier_call_chain+0xc0/0x230 [ 392.397430] blocking_notifier_call_chain+0x85/0xa0 [ 392.397433] fb_set_var+0xc39/0xe00 [ 392.397437] ? fb_set_suspend+0x130/0x130 [ 392.397440] ? lock_acquire+0x1ec/0x400 [ 392.397443] ? __mutex_lock+0x3cd/0x1300 [ 392.397446] ? mutex_trylock+0x1a0/0x1a0 [ 392.397449] ? lock_acquire+0x170/0x400 [ 392.397452] ? do_fb_ioctl+0x3e1/0x9c0 [ 392.397455] do_fb_ioctl+0x450/0x9c0 [ 392.397458] ? lock_downgrade+0x740/0x740 [ 392.397461] ? fb_read+0x570/0x570 [ 392.397465] ? avc_has_extended_perms+0x9c6/0x1030 [ 392.397468] ? avc_ss_reset+0x180/0x180 [ 392.397471] fb_ioctl+0xdd/0x130 [ 392.397479] ? do_fb_ioctl+0x9c0/0x9c0 [ 392.397482] do_vfs_ioctl+0xcda/0x12e0 [ 392.397485] ? selinux_file_ioctl+0x46c/0x5d0 [ 392.397489] ? selinux_file_ioctl+0x125/0x5d0 [ 392.397492] ? check_preemption_disabled+0x41/0x280 [ 392.397496] ? ioctl_preallocate+0x200/0x200 [ 392.397499] ? selinux_file_mprotect+0x600/0x600 [ 392.397502] ? __fget+0x340/0x510 [ 392.397505] ? iterate_fd+0x350/0x350 [ 392.397508] ? security_file_ioctl+0x6c/0xb0 [ 392.397511] ksys_ioctl+0x9b/0xc0 [ 392.397514] __x64_sys_ioctl+0x6f/0xb0 [ 392.397518] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 392.397521] do_syscall_64+0xf9/0x620 [ 392.397525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.397527] RIP: 0033:0x45c829 [ 392.397537] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 392.397541] RSP: 002b:00007f78ca7b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 392.397549] RAX: ffffffffffffffda RBX: 00000000004e4860 RCX: 000000000045c829 [ 392.397553] RDX: 0000000020000000 RSI: 0000000000004601 RDI: 0000000000000004 [ 392.397558] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 392.397563] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 392.397567] R13: 00000000000002f2 R14: 00000000004c54c8 R15: 00007f78ca7b16d4 [ 392.414419] Kernel panic - not syncing: hung_task: blocked tasks [ 392.414437] CPU: 1 PID: 1072 Comm: khungtaskd Not tainted 4.19.121-syzkaller #0 [ 392.414445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.414450] Call Trace: [ 392.414470] dump_stack+0x188/0x20d [ 392.414488] panic+0x26a/0x50e [ 392.414503] ? __warn_printk+0xf3/0xf3 [ 392.414520] ? lapic_can_unplug_cpu.cold+0x44/0x44 [ 392.414536] ? ___preempt_schedule+0x16/0x18 [ 392.414550] ? watchdog+0x962/0xe40 [ 392.414563] ? nmi_trigger_cpumask_backtrace+0x15e/0x1eb [ 392.414578] watchdog+0x973/0xe40 [ 392.414596] ? reset_hung_task_detector+0x30/0x30 [ 392.414612] kthread+0x34a/0x420 [ 392.414626] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 392.414642] ret_from_fork+0x24/0x30 [ 392.416482] Kernel Offset: disabled [ 394.426354] Rebooting in 86400 seconds..