b\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r73, r76, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r71, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) [ 599.590303] protocol 88fb is buggy, dev hsr_slave_0 [ 599.595448] protocol 88fb is buggy, dev hsr_slave_0 [ 599.597017] protocol 88fb is buggy, dev hsr_slave_1 [ 599.600785] protocol 88fb is buggy, dev hsr_slave_1 [ 599.611228] protocol 88fb is buggy, dev hsr_slave_0 [ 599.617180] protocol 88fb is buggy, dev hsr_slave_1 07:28:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) getsockname$tipc(r1, 0x0, &(0x7f0000000400)) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0xfffffca5) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30}, 0x0) r7 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r7, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r9, 0x0, 0x0) r10 = getpgrp(0x0) waitid(0x0, r10, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r10, 0x9, &(0x7f00000001c0)=""/68) r11 = getpgid(r10) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) r14 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r16 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = getpid() r18 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r18, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r18, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r19 = gettid() waitid(0x2c7c96e4f825ad55, r19, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r20 = socket$netlink(0x10, 0x3, 0x8000000004) r21 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r21, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r18, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r20, @ANYRES64=r21, @ANYRES64], @ANYRESDEC=r19]], 0x8}}, 0x20004850) r22 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r22) kcmp(r22, r22, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r22, 0x0, 0x0) r23 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r22, r23, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r19, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r24}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r24}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r17, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r24}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r16, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r15, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r13, r12, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r11, r9, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r24}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r24}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r8, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r24}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r24}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r7, 0x0, 0x1, &(0x7f0000000000)='\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r6, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r24}, 0x30) sched_setattr(0x0, &(0x7f0000000080)={0x370, 0x2, 0x41, 0x0, 0x4}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r25}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r26 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r26, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r26, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:44 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x12}, 0x10, 0x200800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0/bus\x00', &(0x7f0000000640)='ramfs\x00\xa33\xe4\xf3\xd8\xfb\b\xa7\xdeJe\xbd\x1ar\xf1\xf5\x1c\xf7\xf9\f\x1dA\"\x91\xe5\x94s\xfd\xc8\xc7N\x8c&\x19\xfb@\xde\x82\xef\x9f\x8f\xd9\xfd\xfd\\\xaf\x8eJ*\x1e\x01\xfc\xf8\xc2\x05\fX\xb5L\x0f\x84\xf1\xa1\xbb\x13\x93n#5:\xfcg\x13\xcd\xdaj)\xf0\xd7\xc4\xf3\x97\x12\xfekP_a\xa1H\x15=\xf6\xad\x0eX\xdd3\xf9\xefL{\x87/&\xc6I\xbc\xccp}\x0e~\x8f\xedI\xa4\x995c\xde\xb8\x9e\x94\xd6\x80ok\xd4\xac\xe3?1I`\x1dd\xc3\xd5\a\xaf>\xb6*\x8bz\xf7', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) r6 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r7 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) 07:28:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x30, 0x32, 0x119, 0x0, 0x0, {0x2}, [@nested={0x4}, @nested={0x18, 0x1, [@typed={0x14, 0x10, @ipv6=@empty={[0x7, 0x0, 0x11, 0x0, 0xa]}}]}]}, 0x30}}, 0x0) 07:28:44 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) 07:28:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r81, 0x0, 0x1, &(0x7f0000000000)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:44 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) [ 600.401326] openvswitch: netlink: Tunnel attr 17 out of range max 14 07:28:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)=""/109, 0x6d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/117, 0x75}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x3, 0x84) readv(r6, &(0x7f0000000340)=[{&(0x7f0000000180)=""/165, 0xa5}], 0x1) shutdown(r5, 0x0) shutdown(r3, 0x0) [ 600.475367] openvswitch: netlink: Tunnel attr 17 out of range max 14 07:28:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x100, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x180a02, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r5, 0x1, 0x0, 0x0, {{}, {}, {0x11}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r5, 0x400, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44901}, 0x8000) r6 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3, 0x1c) 07:28:44 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000380)=""/10, 0xa}, {&(0x7f0000000640)=""/202, 0x82}, {&(0x7f0000000740)=""/194, 0xc2}, {&(0x7f0000000840)=""/215, 0xd7}, {&(0x7f00000009c0)=""/49, 0x2a}, {&(0x7f0000000540)=""/19, 0x13}], 0x6, 0xfff) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0xffffffff, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x5, &(0x7f0000027000)={0x1, 0x1, 0x3ff}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000400)='./file0/bus\x00', 0x141042, 0x81) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) r6 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r7 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) 07:28:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r1, 0x0, &(0x7f0000000400)) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0], 0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000000c0)=0xe8) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r6}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r7 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r7, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r7, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r73, r76, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r71, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:45 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000f96000)={0x1, 0x6230}, 0x8) close(r2) 07:28:45 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) fcntl$setstatus(r2, 0x4, 0x20c00) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r3, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r3}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffeffffd, 0xa808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r5 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r6, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r6, r6, &(0x7f0000000240), 0x7fff) r7 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r8 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r8, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e20, 0xa2, @rand_addr="2460ec1504e07ca7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000380)='./file0/file0\x00', 0x20) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) 07:28:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r81, 0x0, 0x1, &(0x7f0000000000)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f00000001c0)="240000005a001f0300000007000904fcffffff1010000400feffffff0800000008000000", 0x24) 07:28:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000440)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0x239) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r6, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r81, 0x0, 0x1, &(0x7f0000000000)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r80, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r78, 0x0, 0x1, &(0x7f0000000500)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r76, r77, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r75, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r71, r74, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r69, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r98}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:28:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x101, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 07:28:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) read(r0, 0x0, 0x0) 07:28:47 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000f80)}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0xf4, r6, 0x1, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7f}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x335}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1000}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40157}, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0), 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)=0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) 07:28:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 07:28:47 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r2}}, 0x120) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30}, 0x0) r4 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r4, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r6, 0x0, 0x0) r7 = getpgrp(0x0) waitid(0x0, r7, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r7, 0x9, &(0x7f00000001c0)=""/68) r8 = getpgid(r7) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000000)=0x0) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r14 = getpid() r15 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r15, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r15, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r16 = gettid() waitid(0x2c7c96e4f825ad55, r16, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r17 = socket$netlink(0x10, 0x3, 0x8000000004) r18 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r18, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r15, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r17, @ANYRES64=r18, @ANYRES64], @ANYRESDEC=r16]], 0x8}}, 0x20004850) r19 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r19) kcmp(r19, r19, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r19, 0x0, 0x0) r20 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r19, r20, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r16, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r21}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r14, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r13, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r12, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r10, r9, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r8, r6, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r21}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000cc0)={r22}, 0xa9a7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r5, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r21}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r4, 0x0, 0x1, &(0x7f0000000000)='\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r3, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000500)='\x00', r21}, 0x30) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r23, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r24}}, 0x120) r25 = getpid() sched_setattr(r25, &(0x7f0000000040)={0x30}, 0x0) r26 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r26, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r27 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r27, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r28 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r28, 0x0, 0x0) r29 = getpgrp(0x0) waitid(0x0, r29, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r29, 0x9, &(0x7f00000001c0)=""/68) r30 = getpgid(r29) r31 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r31, 0x8904, &(0x7f0000000000)=0x0) r33 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r34 = openat$cgroup_ro(r33, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r35 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r36 = getpid() r37 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r37, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r37, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r38 = gettid() waitid(0x2c7c96e4f825ad55, r38, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r39 = socket$netlink(0x10, 0x3, 0x8000000004) r40 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r40, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r37, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r39, @ANYRES64=r40, @ANYRES64], @ANYRESDEC=r38]], 0x8}}, 0x20004850) r41 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r41) kcmp(r41, r41, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r41, 0x0, 0x0) r42 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r41, r42, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r43}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r38, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r43}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r43}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r43}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r36, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r43}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r43}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r35, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r43}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r34, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r43}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r32, r31, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r43}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r30, r28, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r43}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r43}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r43}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r27, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r43}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r43}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r43}, 0xc) r44 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r44) r45 = getpid() sched_setattr(r45, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r46 = getpgrp(0x0) r47 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r48 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r45, 0x0, 0xffffffffffffffff, 0x0) close(r48) ioctl$PERF_EVENT_IOC_SET_FILTER(r48, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r49 = inotify_init1(0x0) fcntl$setown(r49, 0x8, 0xffffffffffffffff) fcntl$getownex(r49, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r50, 0x13) syz_open_procfs(r50, &(0x7f0000000040)='clear_refs\x00') r51 = socket$alg(0x26, 0x5, 0x0) bind$alg(r51, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r51, 0x117, 0x1, 0x0, 0x0) r52 = accept$alg(r51, 0x0, 0x0) r53 = dup(r52) write$UHID_DESTROY(r53, &(0x7f0000000080), 0xfff2) recvmmsg(r53, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r54 = getpid() sched_setattr(r54, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r55 = getpid() sched_setattr(r55, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r56 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r56, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r57, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r58}}, 0x120) r59 = getpid() sched_setattr(r59, &(0x7f0000000040)={0x30}, 0x0) r60 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r60, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r61 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r61, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r62 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r62, 0x0, 0x0) r63 = getpgrp(0x0) waitid(0x0, r63, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r63, 0x9, &(0x7f00000001c0)=""/68) r64 = getpgid(r63) r65 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r65, 0x8904, &(0x7f0000000000)=0x0) r67 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r68 = openat$cgroup_ro(r67, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r69 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r70 = getpid() r71 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r71, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r71, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r72 = gettid() waitid(0x2c7c96e4f825ad55, r72, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r73 = socket$netlink(0x10, 0x3, 0x8000000004) r74 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r74, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r71, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r73, @ANYRES64=r74, @ANYRES64], @ANYRESDEC=r72]], 0x8}}, 0x20004850) r75 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r75) kcmp(r75, r75, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r75, 0x0, 0x0) r76 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r75, r76, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r72, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r77}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r77}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r77}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r70, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r77}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r77}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r69, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r68, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r66, r65, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r64, r62, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r77}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r77}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r77}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r61, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r77}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r77}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r77}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r60, 0x0, 0x1, &(0x7f0000000000)='\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r59, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r57, 0x0, 0x1, &(0x7f0000000500)='\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r55, r56, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r54, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r50, r53, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r77}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r77}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r48, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r46, r47, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r45, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r77}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r44, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r77}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r77}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r77}, 0x30) r78 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r78) r79 = getpid() sched_setattr(r79, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r80 = getpgrp(0x0) r81 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r82 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r79, 0x0, 0xffffffffffffffff, 0x0) close(r82) ioctl$PERF_EVENT_IOC_SET_FILTER(r82, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r83 = inotify_init1(0x0) fcntl$setown(r83, 0x8, 0xffffffffffffffff) fcntl$getownex(r83, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r84, 0x13) syz_open_procfs(r84, &(0x7f0000000040)='clear_refs\x00') r85 = socket$alg(0x26, 0x5, 0x0) bind$alg(r85, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r85, 0x117, 0x1, 0x0, 0x0) r86 = accept$alg(r85, 0x0, 0x0) r87 = dup(r86) write$UHID_DESTROY(r87, &(0x7f0000000080), 0xfff2) recvmmsg(r87, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r88 = getpid() sched_setattr(r88, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r89 = getpid() sched_setattr(r89, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r90 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r90, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r91, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r92}}, 0x120) r93 = getpid() sched_setattr(r93, &(0x7f0000000040)={0x30}, 0x0) r94 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r94, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r95 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r95, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r96 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r96, 0x0, 0x0) r97 = getpgrp(0x0) waitid(0x0, r97, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r97, 0x9, &(0x7f00000001c0)=""/68) r98 = getpgid(r97) r99 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r99, 0x8904, &(0x7f0000000000)=0x0) r101 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r102 = openat$cgroup_ro(r101, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r103 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r104 = getpid() r105 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r105, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r105, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r106 = gettid() waitid(0x2c7c96e4f825ad55, r106, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r107 = socket$netlink(0x10, 0x3, 0x8000000004) r108 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r108, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r105, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r107, @ANYRES64=r108, @ANYRES64], @ANYRESDEC=r106]], 0x8}}, 0x20004850) r109 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r109) kcmp(r109, r109, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r109, 0x0, 0x0) r110 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r109, r110, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r106, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r111}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r111}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r111}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r104, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r111}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r111}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r103, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r102, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r100, r99, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r98, r96, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r111}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r111}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r111}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r95, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r111}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r111}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r111}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r94, 0x0, 0x1, &(0x7f0000000000)='\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r93, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r91, 0x0, 0x1, &(0x7f0000000500)='\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r89, r90, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r88, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r84, r87, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r111}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r111}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r82, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r80, r81, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r79, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r111}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r78, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r111}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r111}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r111}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a00)={r111}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r26, 0x0, 0x1, &(0x7f0000000000)='\x00', r43}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r43}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r25, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r43}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r23, 0x0, 0x1, &(0x7f0000000500)='\x00', r43}, 0x30) getsockopt$IP_VS_SO_GET_DESTS(r23, 0x0, 0x484, &(0x7f0000000b80)=""/263, &(0x7f0000000000)=0x107) r112 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) fcntl$setstatus(r112, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0xfffffcd9, 0x1) r113 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r113, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r113}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000840)='./bus\x00', &(0x7f0000000800)='ramfs\x00', 0x1000802, 0x0) r114 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r114, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r115 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r115) r116 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r116, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r116, r116, &(0x7f0000000240), 0x7fff) r117 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r118 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) r119 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r119, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r120 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r121 = getpgrp(0x0) waitid(0x0, r121, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r121, 0x9, &(0x7f00000001c0)=""/68) r122 = getpgid(r121) r123 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r123, 0x8904, &(0x7f0000000000)=0x0) r125 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r126 = openat$cgroup_ro(r125, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r127 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r128 = getpid() r129 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r129, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r129, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r130 = gettid() waitid(0x2c7c96e4f825ad55, r130, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r131 = socket$netlink(0x10, 0x3, 0x0) r132 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r132, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r129, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r131, @ANYRES64=r132, @ANYRES64], @ANYRESDEC=r130]], 0x8}}, 0x20004850) r133 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r133) kcmp(r133, r133, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r133, 0x0, 0x0) r134 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r133, r134, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r135}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r130, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r135}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r135}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r135}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r128, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r135}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r135}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, r127, 0x0, 0x7e, &(0x7f0000000b00)='trusted\\#&>#\x00t:m\x97u\x1b\x83=\xa7\xc9\x18w\xc0\x88\n^w/\x9a,=\xbf\xd7\x1f\x14\xb5\x18T\x9f\xba\xa6\xd5_\x83N\x11\xf8\x96\x02\x16\xde\xdd\xb2\xf6\xa6\x9b\xda\x9e\xba\xce[\xaaC\xdaD\xf9P\xa4\xf2o\x03\x80y8\xb2\xf6\f\f\bO\xce\xf2\xb7\xfeu\x9b\xa5\xc4#\x9e^\xda\xb8\x90\xcbr\xb6\x91\x17\xf9t.\xcd\xc8\x0e\xea\xc3\x00\x87\x97\x1148.\x8a1\xde\x94^\xac\xb0\x11$', r135}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r126, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r135}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r124, r123, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r135}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r122, r120, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r135}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r135}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r135}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r119, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r135}, 0x30) r136 = socket$inet_sctp(0x2, 0x1, 0x84) r137 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r137, 0x84, 0x1d, &(0x7f0000000d00)=ANY=[@ANYBLOB="0100000040a0fd08aaf361188f29d1d629529d2ffaa8da970fb82db6030c5105e521730517c153abcacb4c8158d189d1e94b48a8ac9424daeadd7566", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r136, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r138}, 0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r119, 0x84, 0xf, &(0x7f0000000640)={r138, @in6={{0xa, 0x4e23, 0x4, @mcast1, 0x8}}, 0x0, 0x6, 0x9, 0x3ff, 0x7}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40)={r139, 0xfffffffe}, 0xfffffffffffffe9e) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r118, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r117, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) 07:28:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r81, 0x0, 0x1, &(0x7f0000000000)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r80, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r78, 0x0, 0x1, &(0x7f0000000500)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r76, r77, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r75, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r71, r74, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r69, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r98}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:47 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000014c0)={0x7, 0x2}) readv(r0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000001480)=""/25, 0x19}], 0x2) 07:28:47 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', 0x0, 0x0, 0x0) 07:28:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r6, 0x0, 0x0) r7 = getpgrp(0x0) waitid(0x0, r7, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r7, 0x9, &(0x7f00000001c0)=""/68) r8 = getpgid(r7) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000000)=0x0) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r14 = getpid() r15 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r15, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r15, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r16 = gettid() waitid(0x2c7c96e4f825ad55, r16, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r17 = socket$netlink(0x10, 0x3, 0x8000000004) r18 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r18, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r15, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r17, @ANYRES64=r18, @ANYRES64], @ANYRESDEC=r16]], 0x8}}, 0x20004850) r19 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r19) kcmp(r19, r19, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r19, 0x0, 0x0) r20 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r19, r20, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r16, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r21}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r14, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r13, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r12, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r10, r9, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r8, r6, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r21}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r5, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r21}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r22}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r23 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r23, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r23, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r81, 0x0, 0x1, &(0x7f0000000000)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r80, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r78, 0x0, 0x1, &(0x7f0000000500)='\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r76, r77, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r75, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r71, r74, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r69, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r98}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:48 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x10b842) readv(r0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000001480)=""/25, 0x19}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x3) 07:28:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:48 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0xff) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xa) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b61, &(0x7f00000002c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 07:28:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x374, &(0x7f0000000100)={&(0x7f00000004c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc, @ipv4}]}, 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3ff, 0x400000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000280)={0x0, 0xd8, 0x0, 'queue1\x00', 0x100}) getpid() openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:28:49 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r6 = gettid() waitid(0x2c7c96e4f825ad55, r6, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r7 = socket$netlink(0x10, 0x3, 0x8000000004) r8 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r8, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r5, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESOCT=r7, @ANYRES64=r8, @ANYRES64], @ANYRESDEC=r6]], 0x8}}, 0x20004850) r9 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r9) kcmp(r9, r9, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r9, 0x0, 0x0) r10 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r9, r10, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r4, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r3, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r11}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r3, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r12 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r12, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r13 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r13) r14 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r14, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r14, r14, &(0x7f0000000240), 0x7fff) r15 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r16 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r16, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r15, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) 07:28:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r73, r76, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x9, 0x80009, 0x803, 0x0, 0x4, 0xfefffffd}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0xd6b00, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r6}}, 0x120) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30}, 0x0) r8 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r8, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r10, 0x0, 0x0) r11 = getpgrp(0x0) waitid(0x0, r11, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r11, 0x9, &(0x7f00000001c0)=""/68) r12 = getpgid(r11) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) r15 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r16 = openat$cgroup_ro(r15, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r18 = getpid() r19 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r19, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r19, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r20 = gettid() waitid(0x2c7c96e4f825ad55, r20, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r21 = socket$netlink(0x10, 0x3, 0x8000000004) r22 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r22, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r19, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r21, @ANYRES64=r22, @ANYRES64], @ANYRESDEC=r20]], 0x8}}, 0x20004850) r23 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r23) kcmp(r23, r23, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r23, 0x0, 0x0) r24 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r23, r24, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r20, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r25}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r18, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r17, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r16, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r14, r13, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r12, r10, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r25}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r9, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r25}, 0x30) r26 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r25}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r8, 0x0, 0x1, &(0x7f0000000000)='\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r7, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000500)='\x00', r25}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000440)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0x54) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r27}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r28 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r28, 0x5452, &(0x7f0000000240)=0xfffd) accept4$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000800)=0x1c, 0x800) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r26, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r73, r76, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:50 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = socket$inet(0x2, 0x4040000000000001, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 07:28:50 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x15) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) r6 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r7 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) 07:28:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:50 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="2302"], 0x2) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:28:50 executing program 1: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="2302"], 0x2) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 07:28:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x9, 0x0, 0x200000000000000}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r6, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:50 executing program 0: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) sendmmsg$alg(r0, &(0x7f00000000c0), 0x49249249249252e, 0x0) 07:28:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000000c0)='\x00', 0x5) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 07:28:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)=""/109, 0x6d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/117, 0x75}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r7 = socket$inet6_sctp(0x1c, 0x3, 0x84) readv(r7, &(0x7f0000000340)=[{&(0x7f0000000180)=""/165, 0xa5}], 0x1) shutdown(r6, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 07:28:51 executing program 0: syz_open_dev$sndtimer(0x0, 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000014c0)={0x0, 0x2, 0x1ff}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000014c0)={0x7, 0x2, 0x1ff}) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:28:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x78cf, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/155, 0x9b}, {0x0}, {0x0}], 0x3}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000001740)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 07:28:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r73, r76, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:51 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x224200, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xa, 0x0, 0x0, r3}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/\xd2\xdb\x1e?\x8ess\x9d\x00', 0x464400, 0x0) ioctl$int_in(r4, 0x800000c004500a, &(0x7f0000000300)) r5 = fcntl$getown(r4, 0x9) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r6 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r6, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) syz_emit_ethernet(0xb4, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaa9c72e057124008004d0000a60000000000009078ac142cbbac1e0000861b1f000000000bfac26d63f3bb034c890f0ac1ede2ab42fb9e2f070300000000009078ac1414aae001ea0903ab0c2a6498718d6c6d972b9354d81991719bf55e015914a62b2c527680e0e22ca1a3ff17e6d4875909e109b1aa329b9cc5261fdf778baeacba3e0e3b7203d7024c5b0d93e9a0ecc49b629bc9883fd187b81cd7f3d6b63b62781f5ede8c40895d73e8a7dd93"], 0x0) r7 = open(&(0x7f00000003c0)='./file1\x00', 0x40000, 0x0) fchdir(r7) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r8, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r8, r8, &(0x7f0000000240), 0x7fff) socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') 07:28:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x12, 0x0, 0x1711, 0x2}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r6, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x101, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 07:28:52 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) tkill(r0, 0x12) 07:28:52 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x80) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @remote, 0x4}, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000380)="8836210c2f27b1c09996e470296846155f1c30d1cfffe00e564e5dea4568c806ab3f625526956fbc4ed694c9b4dac6fa75351252b6c10bff632bf9c33cb79060e0205f219ac08217503d8a1b2e8fc4bb2399729c6c2aafc614affadaf2e5801b08cfa7420428012616ba16badf43ef1e24b006c2c687dfa2fe9a7b5624"}, {&(0x7f00000004c0)="0e11e5ec11280cea3d4e6eadd7059002c4980540e2219d68990176962b6a7d907b3ab058b63ba6486d4e8e764ce551040011bba10ae51759315dcfa27fe0f2de5928d3"}, {&(0x7f0000000540)="4b392d5a40dd7010521f12e11211fb93d8e01a315edb0e4476ee9655f438b1d475953686cba7894b8a6b2c432df7d5659a09abccc578380922445b0f2e83a8355f3bcd7d11fa8379de1e3bc947cd0585c0372a4e8178234722c74829c6b04984cb3553ba2d648bf25c2f9f2ff6878c3cdff5eac5393a3305b47506c9a23a"}, {&(0x7f00000005c0)="60c916285010"}, {&(0x7f0000000600)="4aa0ba6e3ecb9b69a461fa72bcef334f23519c1da418b193ff6ac2b96ec27eda0ee31c6a89052e606ef1ba73d83df165368817a61111578ce78c1b72c49ca87be9d9e3e1986871d9a86b5de411b52c839d977b53855531d626f22bfc2dfe0dd7dd709424752b68eb8f552bb398cc8e8a557a681659ebdc5bdf892c8c2f2315a6d98289d9dab366e0ae8d3349dcfcfe29cdbfcec5dc9ddbe4e1"}, {&(0x7f00000006c0)="74397fb2a73c7d36f1c5e3835ac2214433b3b7a44c1cfe6322c282d36bd95c057c220ef5322311ea512165da1640ecbed097ad45fa71360cef29856aeb6b8c76081df07fa43f1a28e6e9de9afd82d46a3ca1117b302acdd6a9cddbacc8da98e213d435a1b8a9"}, {&(0x7f0000000740)="26e3ab23974c117f7f549ecf6cadea95f08c350089d224db0204936b54226c1d852707e15c54072236c92a1a713843fff9c17d3603ba6e4d9f37679b49dbce681c11bab8e14f572a54fc899b49fb7ea11a80c21733868b74d6714f1c0f33e77d351b468621cc1de1ae1a15a684"}, {&(0x7f00000007c0)="76527ea6a6100af787ebb33a5c3c2e9e398edaf65be05174896724b8bf6e9a01e69ea42e1c3a0b4f6dffc2c1d200b1e77a0574e558ac5dd0f1cafbed57943472980e51d1e9386d2985b7b8b508"}, {&(0x7f0000000840)="391bb4313b7bdbe56e01671d066786699c5b9334561d5cce23b7c0270d8331a0c70aa09b49469bbb7e0c86d59878ccfd5b7f1421c8295db6c70c3dbf5e21a33b43d787798d52d1eb36"}], 0x0, &(0x7f0000000940)=[{0x0, 0x0, 0x101, "5d9e8f681739b26f5627b6838201f66bfdc94cbc32046bf0e8bb7ac20ec1e0f97e65695a11f8c480dfefab42703eee7302153d303e838c2f6e7cdad1e0325f2e40ed472956b7394a3d84242412a5437ba72594a0b92dd8ff2ec81bb048db3ae0608829f9c3ee3c9e7bd7c0706019e947e8ed223b52024e40f5c5766612cea4ed1c0450fd9ba0060373c046"}, {0x0, 0x0, 0x3, "26850719512c671154da5bddc8a76c817b0960da839ea6fd9dd13ab70f0d331e1f18f42595fb3d5dc8abfffa15dbe9a7df4239d07c092067a0fa59cd"}, {0x0, 0xa713c6d35dd42a29, 0x0, "31b3c252cf6992e0dfd9d6430c5d106e6b595abdc14365be164260d592cff4fa2c4cb5c1d17e8b5ca778f215f4636838a399009e2428dbf5c01221"}]}}], 0x200, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB="7220cc22aec049f37f5e42da69a5c66371998fafdf4c8806bddccdc17fcc03418e55256158"], 0x25) [ 608.372536] ptrace attach of "/root/syz-executor.0"[25660] was attempted by "/root/syz-executor.0"[25662] 07:28:52 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) r6 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r7 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x5, &(0x7f0000000400)) 07:28:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x2f9}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0x336) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r6}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0xfffffffffffffd32) mkdir(0x0, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000340)={0x1000, 0x2, 0x4, 0x14e804, 0x1ff, {0x0, 0x2710}, {0x4, 0xc, 0x81, 0xf, 0x6, 0x1d, "8bf714ee"}, 0x4, 0x5, @userptr=0xfffffffffffff9ec, 0x40, 0x0, r2}) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0xfff9, 0xffffffffffffffff, 0x0, 0xfffffffffffffe97, 0x40000000000, 0x0, 0x1, r7}]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r8, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r8, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x64200800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r73, r76, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:53 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x18) socket$unix(0x1, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1fe}, &(0x7f0000000200), 0x0) 07:28:53 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x0, 0x0, 0x800}}) 07:28:53 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r4, 0x13) syz_open_procfs(r4, &(0x7f0000000040)='clear_refs\x00') r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) r6 = accept$alg(r5, 0x0, 0x0) r7 = dup(r6) write$UHID_DESTROY(r7, &(0x7f0000000080), 0xfff2) recvmmsg(r7, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r10 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r11, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r12}}, 0x120) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30}, 0x0) r14 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r14, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r15 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r15, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r16 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r16, 0x0, 0x0) r17 = getpgrp(0x0) waitid(0x0, r17, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r17, 0x9, &(0x7f00000001c0)=""/68) r18 = getpgid(r17) r19 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) r21 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r22 = openat$cgroup_ro(r21, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r23 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r24 = getpid() r25 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r25, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r25, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r26 = gettid() waitid(0x2c7c96e4f825ad55, r26, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r27 = socket$netlink(0x10, 0x3, 0x8000000004) r28 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r28, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r25, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r27, @ANYRES64=r28, @ANYRES64], @ANYRESDEC=r26]], 0x8}}, 0x20004850) r29 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r29) kcmp(r29, r29, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r29, 0x0, 0x0) r30 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r29, r30, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r26, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r31}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r31}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r24, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r31}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r23, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r22, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r20, r19, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r18, r16, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r31}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r31}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r15, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r31}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r31}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r14, 0x0, 0x1, &(0x7f0000000000)='\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r13, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r11, 0x0, 0x1, &(0x7f0000000500)='\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r9, r10, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r8, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r31}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, r7, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r31}, 0x30) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x7030, 0xffffffffffffffff, 0x0, 0x0, 0x7}, r4, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r32 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r32, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r33 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r33) r34 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r34, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r34, r34, &(0x7f0000000240), 0x7fff) r35 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r36 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r36, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r35, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) 07:28:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000e3007910a800000000009500000000000000d060040f344e3c38fb58eab63c138f7919ac609c6069de48b29cc27444fe254597cf65419d91365244691ba7901404194269247c1b1edc3123dc6edb8b0f3370e689524a4e4a68273adcef3067289b72a3363a2fe743f8ce68fb4fc59efa2fe255c6a0ed319f045d82f93da12f5b71b8b29aa1251148047fa5c8d32bba61746e32dbe9f23a933d70aeb145c00d8728e26753129af7e192b00c6b6ea44c"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:28:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x1402}) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000240)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xffff00000}, {0x80000006, 0x0, 0x0, 0xfff}]}, 0x10) r4 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r4, 0x200004) sendfile(r1, r4, 0x0, 0x80001d00c0d0) 07:28:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r6, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r82, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:54 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400fffff229c2053707635954fffff7", @ANYRES32, @ANYBLOB="0000000bf1"], 0x3}}, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x3ac) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002a00ffcd88f85839b89f459ddb8fbf15", @ANYRES32=r4], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x2d4) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 07:28:54 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0x7, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x3) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)=0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv;-\xad\xbb\tC9\xe4\xae\xd1+\xaaZ\x1f\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getpid() r9 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = gettid() waitid(0x2c7c96e4f825ad55, r10, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r11 = socket$netlink(0x10, 0x3, 0x8000000004) r12 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r12, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r9, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r11, @ANYRES64=r12, @ANYRES64], @ANYRESDEC=r10]], 0x8}}, 0x20004850) r13 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r13) kcmp(r13, r13, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r13, 0x0, 0x0) r14 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, r14, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r7, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r6, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r4, r3, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r15}, 0x30) perf_event_open(0x0, r4, 0xb, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r16 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r16, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r17 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x150) fchdir(r17) r18 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r18, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r18, r18, &(0x7f0000000240), 0x7fff) r19 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r20 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r20, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r19, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) [ 610.687307] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 [ 610.723022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 07:28:54 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000140)="b9230800000f32640f790e360f212ac4e110c26000150f20d835080000000f22d8b99e0900000f32640f786fdd66ba210066edb8070000000f23d80f21f835800000700f23f866b820000f00d8"}], 0x0, 0x0, 0x0, 0xffffffffffffff39) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:28:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f00000000c0)={0x38, 0x1, 0x72, 0x0, 0x9, 0x10001, 0x0, 0x1, 0x3}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000440)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000001c0)=0xe8) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r6, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) [ 610.933830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 07:28:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) [ 611.057336] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 [ 611.121971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 [ 611.152134] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 07:28:55 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) r6 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r7 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) [ 611.168671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 [ 611.194875] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 [ 611.224477] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 07:28:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) [ 611.293620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25743 comm=syz-executor.0 07:28:55 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5203) 07:28:55 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x26, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000380)='./bus\x00', 0x341442, 0x13b) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) r6 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r7 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x17, &(0x7f0000000400)) 07:28:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:55 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) getdents64(r0, &(0x7f0000000280)=""/121, 0x200002f9) times(0x0) 07:28:55 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x4, 0x0) r0 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000140)={@mcast1}, &(0x7f00000001c0)=0x14) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/212) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r1, 0x4b61, &(0x7f00000002c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 07:28:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x22, 0x20, 0x82}, 0x3c) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 07:28:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r69 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r69) ioctl$PERF_EVENT_IOC_SET_FILTER(r69, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r70 = inotify_init1(0x0) fcntl$setown(r70, 0x8, 0xffffffffffffffff) fcntl$getownex(r70, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r71, 0x13) syz_open_procfs(r71, &(0x7f0000000040)='clear_refs\x00') r72 = socket$alg(0x26, 0x5, 0x0) bind$alg(r72, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r72, 0x117, 0x1, 0x0, 0x0) r73 = accept$alg(r72, 0x0, 0x0) r74 = dup(r73) write$UHID_DESTROY(r74, &(0x7f0000000080), 0xfff2) recvmmsg(r74, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r75 = getpid() sched_setattr(r75, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r76 = getpid() sched_setattr(r76, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r77 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r77, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r78, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r79}}, 0x120) r80 = getpid() sched_setattr(r80, &(0x7f0000000040)={0x30}, 0x0) r81 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r81, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r82 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r82, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r83 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r83, 0x0, 0x0) r84 = getpgrp(0x0) waitid(0x0, r84, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r84, 0x9, &(0x7f00000001c0)=""/68) r85 = getpgid(r84) r86 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r86, 0x8904, &(0x7f0000000000)=0x0) r88 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r89 = openat$cgroup_ro(r88, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r90 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r91 = getpid() r92 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r92, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r92, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r93 = gettid() waitid(0x2c7c96e4f825ad55, r93, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r94 = socket$netlink(0x10, 0x3, 0x8000000004) r95 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r95, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r92, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r94, @ANYRES64=r95, @ANYRES64], @ANYRESDEC=r93]], 0x8}}, 0x20004850) r96 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r96) kcmp(r96, r96, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r96, 0x0, 0x0) r97 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r96, r97, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r93, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r98}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r91, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r90, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r89, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r87, r86, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r98}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r85, r83, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r98}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r98}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r98}, 0x30) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:56 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x2, 0x2bf712454113ea5f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x84, 0x0, 0x0, 0x6, 0x0, 0x20000000, 0xfffd}, 0x0, 0xfffffffffffffffd, r3, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r4 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r5 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r7, 0x800000c004500a, &(0x7f0000000300)) syz_open_dev$audion(&(0x7f0000000640)='/dev/audio#\x00', 0x80000000, 0x802) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000000)=0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r11 = openat$cgroup_ro(r10, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = getpid() r14 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r14, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r15 = gettid() waitid(0x2c7c96e4f825ad55, r15, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r16 = socket$netlink(0x10, 0x3, 0x8000000004) r17 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r17, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r14, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r16, @ANYRES64=r17, @ANYRES64], @ANYRESDEC=r15]], 0x8}}, 0x20004850) r18 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r18) kcmp(r18, r18, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r18, 0x0, 0x0) r19 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r18, r19, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r15, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r20}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r13, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r12, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r11, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r9, r8, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r20}, 0x30) r21 = syz_open_procfs(r9, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r21, 0x8904, &(0x7f0000000000)=0x0) r23 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r24 = openat$cgroup_ro(r23, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r25 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r26 = getpid() r27 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r27, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r27, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r28 = gettid() waitid(0x2c7c96e4f825ad55, r28, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r29 = socket$netlink(0x10, 0x3, 0x8000000004) r30 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r30, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r27, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r29, @ANYRES64=r30, @ANYRES64], @ANYRESDEC=r28]], 0x8}}, 0x20004850) r31 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r31) kcmp(r31, r31, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r31, 0x0, 0x0) r32 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r31, r32, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r28, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r33}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r33}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r33}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r26, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r33}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r33}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r25, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r24, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r22, r21, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r33}, 0x30) write$P9_RREADLINK(r21, &(0x7f0000000540)=ANY=[], 0xff78) sendfile(r6, r6, &(0x7f0000000240), 0x7fff) r34 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r35 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x802, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r35, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r34, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) 07:28:56 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000140)={@mcast1}, &(0x7f00000001c0)=0x14) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/212) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b61, &(0x7f00000002c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 07:28:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/create\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x40000000000010a, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xfffffffffffffe87, 0x2, 0x10000001, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x2, 0x0, 0xfffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r6, 0x0, 0x0) r7 = getpgrp(0x0) waitid(0x0, r7, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r7, 0x9, &(0x7f00000001c0)=""/68) r8 = getpgid(r7) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000000)=0x0) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r14 = getpid() r15 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r15, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r15, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r16 = gettid() waitid(0x2c7c96e4f825ad55, r16, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r17 = socket$netlink(0x10, 0x3, 0x8000000004) r18 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r18, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r15, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r17, @ANYRES64=r18, @ANYRES64], @ANYRESDEC=r16]], 0x8}}, 0x20004850) r19 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r19) kcmp(r19, r19, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r19, 0x0, 0x0) r20 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r19, r20, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r16, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r21}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r14, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r13, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r12, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r10, r9, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r8, r6, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r21}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r5, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r21}, 0x30) r23 = getpid() sched_setattr(r23, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r24 = getpgrp(0x0) r25 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r26 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r23, 0x0, 0xffffffffffffffff, 0x0) close(r26) ioctl$PERF_EVENT_IOC_SET_FILTER(r26, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r27 = inotify_init1(0x0) fcntl$setown(r27, 0x8, 0xffffffffffffffff) fcntl$getownex(r27, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r28, 0x13) syz_open_procfs(r28, &(0x7f0000000040)='clear_refs\x00') r29 = socket$alg(0x26, 0x5, 0x0) bind$alg(r29, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r29, 0x117, 0x1, 0x0, 0x0) r30 = accept$alg(r29, 0x0, 0x0) r31 = dup(r30) write$UHID_DESTROY(r31, &(0x7f0000000080), 0xfff2) recvmmsg(r31, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r32 = getpid() sched_setattr(r32, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r33 = getpid() sched_setattr(r33, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r34 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r34, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r35, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r36}}, 0x120) r37 = getpid() sched_setattr(r37, &(0x7f0000000040)={0x30}, 0x0) r38 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r38, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r39, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r40 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r40, 0x0, 0x0) r41 = getpgrp(0x0) waitid(0x0, r41, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r41, 0x9, &(0x7f00000001c0)=""/68) r42 = getpgid(r41) r43 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r43, 0x8904, &(0x7f0000000000)=0x0) r45 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r46 = openat$cgroup_ro(r45, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r47 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r48 = getpid() r49 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r49, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r49, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r50 = gettid() waitid(0x2c7c96e4f825ad55, r50, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r51 = socket$netlink(0x10, 0x3, 0x8000000004) r52 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r52, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r49, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r51, @ANYRES64=r52, @ANYRES64], @ANYRESDEC=r50]], 0x8}}, 0x20004850) r53 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r53) kcmp(r53, r53, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r53, 0x0, 0x0) r54 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x80}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r53, r54, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r50, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r55}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r55}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r55}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r48, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r55}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r55}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r47, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r46, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r44, r43, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r42, r40, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r55}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r55}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r55}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r39, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r55}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r55}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r55}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r38, 0x0, 0x1, &(0x7f0000000000)='\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r37, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r35, 0x0, 0x1, &(0x7f0000000500)='\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r33, r34, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r32, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r28, r31, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r55}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r55}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r26, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r55}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r24, r25, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r55}, 0x30) r56 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r56, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r57 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r57, 0x0, 0x0) r58 = getpgrp(0x0) waitid(0x0, r58, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r58, 0x9, &(0x7f00000001c0)=""/68) r59 = getpgid(r58) r60 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r60, 0x8904, &(0x7f0000000000)=0x0) r62 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r63 = openat$cgroup_ro(r62, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r64 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r65 = getpid() r66 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r66, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r66, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r67 = gettid() waitid(0x2c7c96e4f825ad55, r67, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r68 = socket$netlink(0x10, 0x3, 0x8000000004) r69 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r69, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r66, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000b00)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e05248e7e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4ae29ef75", @ANYRESOCT=r68, @ANYRES64=r69, @ANYRES64], @ANYRESDEC=r67]], 0x8}}, 0x20004850) r70 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r70) kcmp(r70, r70, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r70, 0x0, 0x0) r71 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r70, r71, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r72}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r67, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r72}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r72}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r72}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r65, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r72}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r72}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r64, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r72}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r63, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r72}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r61, r60, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r72}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r59, r57, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r72}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r72}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r72}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r56, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r72}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r56, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000000c0)=0xffffffffffffff86) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000009c0)={0x3, @bcast, r74}) r75 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r75, 0x0, 0x0) r76 = getpgrp(0x0) waitid(0x0, r76, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r76, 0x9, &(0x7f00000001c0)=""/68) r77 = getpgid(r76) r78 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r78, 0x8904, &(0x7f0000000000)=0x0) r80 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r81 = openat$cgroup_ro(r80, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r82 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r83 = getpid() r84 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r84, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r84, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r85 = gettid() waitid(0x2c7c96e4f825ad55, r22, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r86 = socket$netlink(0x10, 0x3, 0x8000000004) r87 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r87, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r84, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r86, @ANYRES64=r87, @ANYRES64], @ANYRESDEC=r85]], 0x8}}, 0x20004850) r88 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r88) kcmp(r88, r88, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r88, 0x0, 0x0) r89 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r88, r89, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r90}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r85, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r90}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r90}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r90}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r83, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r90}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r90}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r82, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r90}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r81, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r90}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r79, r78, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r90}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r77, r75, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r90}, 0x30) perf_event_open(0x0, r73, 0x0, 0xffffffffffffffff, 0xa) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r91 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r91, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r91, 0x400c6615, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8ce280) socket$inet6(0xa, 0x400000000001, 0x0) 07:28:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x101, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) 07:28:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpgrp(0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r5, 0x13) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0xfffffffffffffd6d) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r13}}, 0x120) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30}, 0x0) r15 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r15, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r17 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r17, 0x0, 0x0) r18 = getpgrp(0x0) waitid(0x0, r18, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r18, 0x9, &(0x7f00000001c0)=""/68) r19 = getpgid(r18) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r20, 0x8904, &(0x7f0000000000)=0x0) r22 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r23 = openat$cgroup_ro(r22, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r24 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r25 = getpid() r26 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r26, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r26, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x2c7c96e4f825ad55, r27, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r28 = socket$netlink(0x10, 0x3, 0x8000000004) r29 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r29, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r26, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r28, @ANYRES64=r29, @ANYRES64], @ANYRESDEC=r27]], 0x8}}, 0x20004850) r30 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r30) kcmp(r30, r30, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r30, 0x0, 0x0) r31 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r30, r31, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r25, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r24, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r23, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r21, r20, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r19, r17, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r16, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r32}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r32}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r15, 0x0, 0x1, &(0x7f0000000000)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r14, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r12, 0x0, 0x1, &(0x7f0000000500)='\x00', r32}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r10, r11, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r32}, 0x30) r33 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r33) r34 = getpid() sched_setattr(r34, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r35 = getpgrp(0x0) r36 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r37 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r34, 0x0, 0xffffffffffffffff, 0x0) close(r37) ioctl$PERF_EVENT_IOC_SET_FILTER(r37, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r38 = inotify_init1(0x0) fcntl$setown(r38, 0x8, 0xffffffffffffffff) fcntl$getownex(r38, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r39, 0x13) syz_open_procfs(r39, &(0x7f0000000040)='clear_refs\x00') r40 = socket$alg(0x26, 0x5, 0x0) bind$alg(r40, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r40, 0x117, 0x1, 0x0, 0x0) r41 = accept$alg(r40, 0x0, 0x0) r42 = dup(r41) write$UHID_DESTROY(r42, &(0x7f0000000080), 0xfff2) recvmmsg(r42, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r43 = getpid() sched_setattr(r43, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r44 = getpid() sched_setattr(r44, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r45 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r45, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r46, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r47}}, 0x120) r48 = getpid() sched_setattr(r48, &(0x7f0000000040)={0x30}, 0x0) r49 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r49, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r50 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r50, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r51 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r51, 0x0, 0x0) r52 = getpgrp(0x0) waitid(0x0, r52, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r52, 0x9, &(0x7f00000001c0)=""/68) r53 = getpgid(r52) r54 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r54, 0x8904, &(0x7f0000000000)=0x0) r56 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r57 = openat$cgroup_ro(r56, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r58 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r59 = getpid() r60 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r60, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r61 = gettid() waitid(0x2c7c96e4f825ad55, r61, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r62 = socket$netlink(0x10, 0x3, 0x8000000004) r63 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r63, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r60, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r62, @ANYRES64=r63, @ANYRES64], @ANYRESDEC=r61]], 0x8}}, 0x20004850) r64 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r64) kcmp(r64, r64, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r64, 0x0, 0x0) r65 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r64, r65, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r61, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r59, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r58, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r57, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r55, r54, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r53, r51, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r50, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r66}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r49, 0x0, 0x1, &(0x7f0000000000)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r48, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r46, 0x0, 0x1, &(0x7f0000000500)='\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r44, r45, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r43, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r39, r42, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r37, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r35, r36, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r34, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r33, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000001c0)='bdev!vboxnet1\xba#(-\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r66}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='attr/current\x00', r66}, 0x30) r67 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r67) r68 = getpid() sched_setattr(r68, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r69 = getpgrp(0x0) r70 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r71 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x7fffffff, 0x8, 0x0, 0x0, 0x27}, r68, 0x0, 0xffffffffffffffff, 0x0) close(r71) ioctl$PERF_EVENT_IOC_SET_FILTER(r71, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r72 = inotify_init1(0x0) fcntl$setown(r72, 0x8, 0xffffffffffffffff) fcntl$getownex(r72, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r73, 0x13) syz_open_procfs(r73, &(0x7f0000000040)='clear_refs\x00') r74 = socket$alg(0x26, 0x5, 0x0) bind$alg(r74, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r74, 0x117, 0x1, 0x0, 0x0) r75 = accept$alg(r74, 0x0, 0x0) r76 = dup(r75) write$UHID_DESTROY(r76, &(0x7f0000000080), 0xfff2) recvmmsg(r76, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/177, 0xb1}], 0x2}}], 0x1, 0x0, 0x0) r77 = getpid() sched_setattr(r77, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r78 = getpid() sched_setattr(r78, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r79 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r79, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r80, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r81}}, 0x120) r82 = getpid() sched_setattr(r82, &(0x7f0000000040)={0x30}, 0x0) r83 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r83, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r84 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r84, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r85 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r85, 0x0, 0x0) r86 = getpgrp(0x0) waitid(0x0, r86, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r86, 0x9, &(0x7f00000001c0)=""/68) r87 = getpgid(r86) r88 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r88, 0x8904, &(0x7f0000000000)=0x0) r90 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r91 = openat$cgroup_ro(r90, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r92 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r93 = getpid() r94 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r94, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r94, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r95 = gettid() waitid(0x2c7c96e4f825ad55, r95, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r96 = socket$netlink(0x10, 0x3, 0x8000000004) r97 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r97, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r94, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000001640)=ANY=[@ANYBLOB="c80fe308800d336b0f238e34fad2b86d639ab497c7d954184948eff535391ba48096879c34f645f61386a7577299707927fb07960a06e8beea6e574e7e09bebd00000000c822a8817e3e56d4ecc913d42160090000002c96632e5fd0ced728e0529628e5918466b83b6b5187cbda44daa9b7f49c31c56522eff20df086d4", @ANYRESOCT=r96, @ANYRES64=r97, @ANYRES64], @ANYRESDEC=r95]], 0x8}}, 0x20004850) r98 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r98) kcmp(r98, r98, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r98, 0x0, 0x0) r99 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r98, r99, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r95, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r93, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r92, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r91, 0x0, 0x49, &(0x7f0000000a80)='em1\x91bdevbdevvmnet1\x00*\xb9\x18I]\x1fq\xab\x0f\x1f\xa6$\xe3\xe8{,\x9eQ\x132W\x1d0\xf2>\xff\xee>\xbch\xd8\xc2\xab-\xbdy!X-\xe7;D\xcdsy\xc9o\xfcu\x9a\xb9\x03$\x1f', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r89, r88, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r87, r85, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r84, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r100}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r100}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r100}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r83, 0x0, 0x1, &(0x7f0000000000)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r82, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r80, 0x0, 0x1, &(0x7f0000000500)='\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r78, r79, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r69, r70, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r100}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r68, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='em1nodevem1(\x00', r100}, 0x30) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0xd8, &(0x7f00000003c0)="b62e626b3d3dcddb31000cc8efd07d07c6281f73b9538a83e7bd2d4bd20160c3fb779b61afb8b4535745479ba94c2c40342283df7f828ec75eb1741f5f5b5cfb6343ef113306452b746bf18d5881f27476e9d6e7a17eba641df3f3b925254b1a68424a22afa53dbc3594009dec1015fe270cef5e2a7e87f7e05b549fc17180054b5012fbd667c4778611e3b768b91304a2c07e385f49f983b91e938248ef4bb5fe96727d676405ce77270e6c11a6d2d21f16aad337d9ac8e42624a5c7c5df06d6277fa6af8c930ddc3517be5aecfd884b9fa4427277e27b1", 0x32, 0x0, &(0x7f00000004c0)="02b7b15a94c7e35b415604f18603789079def70593323e60bbc054fbaf16e1c5723b144d82cfb7430c01a62893b63f374c13"}) 07:28:56 executing program 0: 07:28:57 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/247, &(0x7f0000000000)=0xf7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/\xd9wv/audi\x05\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) fcntl$setstatus(r1, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0xb726, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0), 0x4) bind$llc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r3 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x3ff}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x80, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) r6 = socket(0x0, 0x80000000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r7 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x100) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e21, 0xa2, @rand_addr="2460ec1504e063a7dca67292314196d4", 0x2}}}, &(0x7f00000003c0)=0x84) open(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)) [ 611.940821] kobject: 'loop5' (ffff8880a41e45e0): kobject_uevent_env [ 611.940850] kobject: 'loop5' (ffff8880a41e45e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 612.022609] kobject: 'loop2' (ffff8880a40b4d20): kobject_uevent_env [ 612.022640] kobject: 'loop2' (ffff8880a40b4d20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 612.170782] kobject: 'loop3' (ffff8880a4117620): kobject_uevent_env [ 612.170812] kobject: 'loop3' (ffff8880a4117620): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 612.560340] kobject: 'loop4' (ffff8880a414c560): kobject_uevent_env [ 612.560368] kobject: 'loop4' (ffff8880a414c560): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 612.922839] kobject: 'loop2' (ffff8880a40b4d20): kobject_uevent_env [ 612.922870] kobject: 'loop2' (ffff8880a40b4d20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 613.019742] kasan: CONFIG_KASAN_INLINE enabled [ 613.021687] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 613.021712] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 613.021717] Modules linked in: [ 613.021727] CPU: 1 PID: 1445 Comm: kswapd0 Not tainted 4.14.160-syzkaller #0 [ 613.021731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.021737] task: ffff8880a66e6480 task.stack: ffff8880a66a0000 [ 613.021750] RIP: 0010:page_vma_mapped_walk+0x4ff/0x1cc0 [ 613.021754] RSP: 0018:ffff8880a66a7508 EFLAGS: 00010246 [ 613.021761] RAX: dffffc0000000000 RBX: ffff8880a66a75f0 RCX: ffff8880a66a7780 [ 613.021766] RDX: 0000000000000000 RSI: ffff88808327f358 RDI: ffff888000132d50 [ 613.021770] RBP: ffff8880a66a7588 R08: ffff8880a66e6480 R09: 0000000000000001 [ 613.021774] R10: 0000000000000000 R11: ffff8880a66e6480 R12: 0000000000000000 [ 613.021778] R13: 0000000000000000 R14: ffff8880a66a7650 R15: 0000000000476000 [ 613.021784] FS: 0000000000000000(0000) GS:ffff8880aed00000(0000) knlGS:0000000000000000 [ 613.021789] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 613.021793] CR2: 0000001b32f37000 CR3: 0000000210e93000 CR4: 00000000001426e0 [ 613.021801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 613.021806] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 613.021808] Call Trace: [ 613.021818] ? mark_held_locks+0xb1/0x100 [ 613.021831] page_referenced_one+0x1a6/0x500 [ 613.021840] ? __lock_is_held+0xb6/0x140 [ 613.021847] ? page_mapcount_is_zero+0x30/0x30 [ 613.021857] ? page_mapcount_is_zero+0x30/0x30 [ 613.021864] rmap_walk_file+0x38d/0x8b0 [ 613.021876] rmap_walk+0xed/0x190 [ 613.021891] page_referenced+0x3e7/0x4e0 [ 613.021898] ? rmap_walk+0x190/0x190 [ 613.021908] ? page_mapcount_is_zero+0x30/0x30 [ 613.021914] ? page_get_anon_vma+0x2b0/0x2b0 [ 613.021990] shrink_active_list+0x52c/0xd60 [ 613.022001] ? shrink_inactive_list+0xf40/0xf40 [ 613.022009] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 613.022017] ? inactive_list_is_low+0x27d/0x6c0 [ 613.022027] shrink_node_memcg+0xc03/0x11c0 [ 613.022039] ? shrink_active_list+0xd60/0xd60 [ 613.022046] ? find_held_lock+0x35/0x130 [ 613.022054] ? rcu_read_unlock+0x16/0x60 [ 613.022089] ? mem_cgroup_iter+0x39e/0x660 [ 613.022094] ? vmpressure+0x157/0x300 [ 613.022102] shrink_node+0x303/0xc40 [ 613.022114] ? shrink_node_memcg+0x11c0/0x11c0 [ 613.022123] kswapd+0x8fb/0x1600 [ 613.022135] ? mem_cgroup_shrink_node+0x650/0x650 [ 613.022148] ? finish_task_switch+0x178/0x650 [ 613.022153] ? finish_task_switch+0x14d/0x650 [ 613.022163] ? finish_wait+0x260/0x260 [ 613.022220] kthread+0x319/0x430 [ 613.022226] ? mem_cgroup_shrink_node+0x650/0x650 [ 613.022231] ? kthread_create_on_node+0xd0/0xd0 [ 613.022240] ret_from_fork+0x24/0x30 [ 613.022248] Code: 6b 12 00 00 48 8b 45 b0 4d 89 fc 49 c1 ec 24 41 81 e4 f8 0f 00 00 4c 03 60 50 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 1f 12 00 00 4d 8b 24 24 41 f6 c4 01 75 08 45 [ 613.022398] RIP: page_vma_mapped_walk+0x4ff/0x1cc0 RSP: ffff8880a66a7508 [ 613.033922] ---[ end trace 6277236fb1c516b1 ]--- [ 613.033929] Kernel panic - not syncing: Fatal exception [ 613.035353] Kernel Offset: disabled [ 613.420673] Rebooting in 86400 seconds..