0001c0)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 21:20:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0xaece, 0x0) 21:20:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0)) 21:20:13 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0xaece, 0x0) 21:20:13 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:13 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 21:20:13 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000001100), 0x7fff, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000000c0)={0x0, 0x31424752, 0x0, @stepwise}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b3c, 0x0) r2 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f0000000000)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) dup2(r3, r3) fcntl$setstatus(r2, 0x4, 0x42800) socket$rxrpc(0x21, 0x2, 0xa) openat$apparmor_thread_exec(0xffffff9c, &(0x7f0000000240), 0x2, 0x0) io_uring_setup(0x6ac, &(0x7f00000003c0)={0x0, 0x89a3, 0x1, 0x1, 0x15c}) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7}, 0x0, 0x0, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3000002, 0x40032, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) fork() 21:20:13 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0, r1}, 0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000080)={'wp256-generic\x00'}}) 21:20:13 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_settime(0x1b76ca88ffffffff, &(0x7f0000000000)={0x77359400}) 21:20:13 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0xaece, 0x0) 21:20:14 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0xaece, 0x0) 21:20:14 executing program 3: add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, 0x0, r0}, 0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000080)={'wp256-generic\x00'}}) 21:20:14 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) 21:20:14 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$xdp(0x2c, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="580000001400192340834b80043f679a2cff00804824ca945f640094000500289d5aaa00000ec00000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a00"/88, 0x58}], 0x1) 21:20:14 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x8401, 0x0) 21:20:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0xaece, 0x0) [ 3075.278302][T32070] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:15 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:15 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) 21:20:15 executing program 3: add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, 0x0, r0}, 0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000080)={'wp256-generic\x00'}}) 21:20:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0xaece, 0x0) 21:20:15 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$xdp(0x2c, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="580000001400192340834b80043f679a2cff00804824ca945f640094000500289d5aaa00000ec00000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a00"/88, 0x58}], 0x1) 21:20:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 21:20:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private0}, r1}}, 0x38) 21:20:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xf4240) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 21:20:15 executing program 3: add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, 0x0, r0}, 0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000080)={'wp256-generic\x00'}}) [ 3076.553024][T32097] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:15 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) 21:20:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0xaece, 0x0) 21:20:16 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0}, 0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000080)={'wp256-generic\x00'}}) [ 3077.134401][T32112] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:17 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:17 executing program 2: r0 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, r2, 0x0) 21:20:17 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 21:20:17 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x541b, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @broadcast}}) 21:20:17 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000740)={@multicast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "133600", 0x10, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra}}}}}, 0x0) 21:20:17 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0}, 0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000080)={'wp256-generic\x00'}}) 21:20:17 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5452, &(0x7f0000000180)) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, r1}, 0x20) 21:20:17 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 21:20:17 executing program 2: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000000)='nfsd\x00', 0x0) r1 = dup(r0) read$rfkill(r1, 0x0, 0x0) 21:20:17 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0}, 0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000080)={'wp256-generic\x00'}}) 21:20:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='bond_slave_0\x00', 0x10) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000040)) 21:20:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) 21:20:18 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:18 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 21:20:18 executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000002c0)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x1be) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 21:20:18 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r1}, 0x0, 0x0, 0x0) 21:20:18 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = landlock_create_ruleset(&(0x7f00000000c0)={0x100}, 0x8, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000140)={0x100, r1}, 0x0) landlock_restrict_self(r0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:20:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:19 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x0, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) 21:20:19 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000680)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x4, 0x0, &(0x7f0000000180)=[@register_looper], 0x0, 0x0, 0x0}) 21:20:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:19 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r1}, 0x0, 0x0, 0x0) 21:20:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff30, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030030000b05d25a80738c6394f90124fc601000021b0a000600053582c137153e370748018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 3080.512327][T32180] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:19 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x0, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) [ 3080.873344][T32186] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3080.881725][T32186] netlink: 194484 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3081.043927][T32188] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:20 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:20 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r1}, 0x0, 0x0, 0x0) 21:20:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:20 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x28, r0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'erspan0\x00'}]}, 0x28}}, 0x0) 21:20:20 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='oom_score\x00') read(r0, &(0x7f0000002580)=""/4096, 0x1000) 21:20:20 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x0, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) [ 3081.860189][T32206] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r1}, 0x0, 0x0, &(0x7f0000000840)={0x0}) 21:20:21 executing program 4: r0 = syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, {0x0, r3}}, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 21:20:21 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000240)='-\x00', 0x40, 0x0, &(0x7f0000000280)={0x401, 0x5, 0xffffffffffffffff, 0x6}) 21:20:21 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:21 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) 21:20:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r1}, 0x0, 0x0, &(0x7f0000000840)={0x0}) [ 3082.529076][T32223] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:22 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:22 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(r0, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8800, 0x0) 21:20:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x1, 0x4, 0x101}, 0x14}}, 0x0) 21:20:22 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) 21:20:22 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:22 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000540)="36d56dbb17be27883311334dee5bbe3c5d71554a9664b36e03ef73dfb97ba651a52d3550fe0714cbad4eb672c11d0037346086ba66f160d9384ca5445a11576dc3dbab94dc73b3d802a1b500c3136f7a7192310f8a3f9e4c4b3f7137e380c7a1148a40089f04f1dfd7278188254b4da38cb259e968119902e9a77cce82ee4448a8af0ffdd500c2558d4f74ff738ff5f2bec979b5487fcc60bd", 0x99, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="7f", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r1}, 0x0, 0x0, &(0x7f0000000840)={0x0}) [ 3083.460607][T32240] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x71, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f0000000000)=""/35, 0x0, 0x23}, 0x20) 21:20:22 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:22 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x80, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x40, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x3, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x80}}, 0x0) 21:20:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0xffffffffffff8001}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) chdir(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 21:20:23 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 3084.215268][T32255] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 21:20:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000000c0)="8f2a0a65bd8c00030304000e0580a7b6072e63e286a5cefe", 0x5ac) 21:20:24 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:24 executing program 2: r0 = shmat(0x0, &(0x7f0000ff6000/0x1000)=nil, 0x4000) syz_io_uring_setup(0x1cd3, &(0x7f0000000000), &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x0, 0x0) shmdt(r0) 21:20:24 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x78, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x38, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x78}}, 0x0) 21:20:24 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:24 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="07009af702002012a3cc0e1a00070900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$TCXONC(r3, 0x540a, 0x3) 21:20:24 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000000c0)="8f2a0a65bd8c00030304000e0580a7b6072e63e286a5cefe", 0x5ac) 21:20:24 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x78, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x38, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x78}}, 0x0) 21:20:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:24 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000000c0)="8f2a0a65bd8c00030304000e0580a7b6072e63e286a5cefe", 0x5ac) 21:20:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) dup2(r0, r1) 21:20:24 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="07009af702002012a3cc0e1a00070900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$TCXONC(r3, 0x540a, 0x3) 21:20:25 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:26 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:26 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000150000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b00000000000000001a4ce875f2e340b7679500800010000000000101013c581103b34c0d6327ecce66fd792bbf0e5bf5ff1b0816e3f6db1c00010000000040000049740000000000000002ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x78, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x38, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1a, 0xa}}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x78}}, 0x0) 21:20:26 executing program 2: r0 = socket$inet(0x10, 0x80003, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0000e8fe0208010001080003000300fe7f0000", 0x24}], 0x1}, 0x0) 21:20:26 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="07009af702002012a3cc0e1a00070900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$TCXONC(r3, 0x540a, 0x3) 21:20:26 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000000c0)="8f2a0a65bd8c00030304000e0580a7b6072e63e286a5cefe", 0x5ac) 21:20:26 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:26 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) [ 3087.130612][T32311] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3087.219730][T32312] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 21:20:26 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="07009af702002012a3cc0e1a00070900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$TCXONC(r3, 0x540a, 0x3) 21:20:26 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/sdio', 0x0, 0x0) getdents(r0, &(0x7f0000000240)=""/230, 0xe6) 21:20:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:20:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000400008000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') creat(&(0x7f0000000000)='./bus\x00', 0x0) 21:20:27 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:27 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:27 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2000000, 0x0, 0x103, 0x1}, 0x2c) 21:20:27 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 21:20:27 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) 21:20:28 executing program 3: perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000000)='nfsd\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 21:20:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$capi20(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044308, &(0x7f0000000040)=0x8) 21:20:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=&(0x7f0000000000)="0b000000000000000c010000000000000001000000000000ff00"}) 21:20:28 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {}, 0x1c, {0x2, 0x0, @loopback}, 'bond_slave_1\x00'}) 21:20:28 executing program 3: r0 = syz_io_uring_setup(0x8ea, &(0x7f0000000380), &(0x7f0000003000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000540), &(0x7f0000000580)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000740)=[{&(0x7f00000005c0)=""/140, 0x8c}], 0x1) 21:20:29 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:29 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {}, 0x1c, {0x2, 0x0, @loopback}, 'bond_slave_1\x00'}) 21:20:29 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x46, &(0x7f0000000140)={@link_local, @random="ece65fbcee55", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x10, 0x11, 0x0, @remote, @local, {[], {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 21:20:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, 0x0) 21:20:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x4b32, 0xffffffffffffffff) 21:20:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:30 executing program 2: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/18, 0x12}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@hci, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 21:20:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, 0x0) 21:20:30 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40002103) 21:20:30 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x8000000803, 0x0) writev(r0, 0x0, 0x0) 21:20:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:31 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, 0x0) 21:20:31 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000017c0)=@newtaction={0xe68, 0x30, 0x25, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) 21:20:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x54, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x24, 0x2, {{}, [@TCA_NETEM_DELAY_DIST={0x6, 0x2, 'Z!'}]}}}]}, 0x54}}, 0x0) 21:20:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:32 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=0x0}) 21:20:32 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r0, 0x800448f0, &(0x7f0000000040)) 21:20:32 executing program 4: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) read$dsp(r0, &(0x7f00000001c0)=""/150, 0x96) perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc0045009, &(0x7f0000000000)) 21:20:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:33 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:33 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000240), 0x7, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000200)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x980913, 0x0, '\x00', @p_u32=0x0}}) 21:20:33 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=0x0}) 21:20:33 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:33 executing program 4: sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000000040), 0xc, 0x0}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000e40)=""/4109, 0x100d}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:20:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', @ifru_data=0x0}) 21:20:34 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:34 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 21:20:34 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:34 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = fanotify_init(0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) [ 3095.389498][ T1198] ieee802154 phy0 wpan0: encryption failed: -22 [ 3095.396156][ T1198] ieee802154 phy1 wpan1: encryption failed: -22 21:20:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x71, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840), 0x90f, 0x28101) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f00000000c0)={0x0, 0x1, [{0x5}]}) 21:20:35 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:35 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:35 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) 21:20:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053580)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, r3}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {r2}], 0x0, "76ecb79257e855"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000004ae00)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81e8943c, &(0x7f000004be00)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb78e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f000005dd80)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000440)={@remote, @dev={0xfe, 0x80, '\x00', 0x11}, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000620c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0xbe, "6ca0ebe46f5ba8"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000080)={0x0, r6, "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", "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"}) 21:20:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x0) 21:20:36 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f00000000c0)=""/115, 0x73) 21:20:36 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:36 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000140)=0x90) 21:20:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:36 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x82, &(0x7f0000000000)=@assoc_value, &(0x7f0000000280)=0x8) 21:20:37 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:37 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:37 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:37 executing program 4: r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000380)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x3}) 21:20:37 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000640)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x0, 0x9}}]}, 0x38}}, 0x0) 21:20:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053580)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, r3}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {r2}], 0x0, "76ecb79257e855"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000004ae00)={0x0, 0x0, "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", "170e844bcee49472449d77ee3c8fe5f826f90a8f3544b5b85803e065c4221bc5f0cfe21f48c37b18b90a14ddf6b0ef9b67ee9aef3133c8ca6a0c8814bb782abb3120b114571284a8ec24fe29d1f7c8c269a3f89f9b035018c7d86e3b705ab997b49934111c002022083828b55951837651d94718007ad1d8617c4eb0df32ced52ca3f5fdac0c61c61f42eef165708c9f5a65201021b1a78840ea0c42137bfc33f4e7434a7255d13f1d9d26922878f63237d008146443c6f514e5ae1b48f16affd47aac99c0bc29219922c6024d8a129f619b4d5ea9c4c24fdd290262f54e055ea8bf0db0ac233057eb1012f613ab38b87620b334f0b9fd3a3a56a19e44c41098aeda9278fd802147fc032855be0f83b06b7d2fd021d0dfae1c1f4b7180a7e6bfd4655bd064c517fa74146d0efc69751e71d643e1591ab8a53affb695bd880449965e31c1fa24f067d72069fbf690d01d398c4fca3af00c5dcfaf6ae2eea73fb55b8b69abe65112acfa140c77989ada3c4cdabaf76e7eada84e6f00e944d0f0f73fecd84be273cd735cd1d71df6cedf8ba10780c3257e6b7c91e20c4d77411e007f3997c05bff2efd4bd25b39dd4099f2892e40436faf03b110da79ba6bb9dad88ec01fb7294e4b832739a847168c3dfcfd54289a15b57b0cd20bbca67834f7f1ebcea57a8e0127a6d624ce30e685103f97c5f3a39c62d0d1d9ca583a3b57c6312b403f94bf267fe081fffc1cc35d6680afd201fd09bb64d901c308b34a29f02eebc46bdad635fb6fd30075914f1b398081b7f784f75c3f10b5b7914db3f7993b264eabbf617f288d53d313774c1e36a319bd4860de61771f05d15187d8964de82bbed81daecf6350fa469ea771d3a065af661a9fef9c096bb0da79d099b35fca0b2ffa03baea9666b3624cf699336c58e5dadb0a7fab3d387fe5e59295208911ac531cd8d5aa2658a1900bdd45400487a478d933c4ab17f6d6b90ecb9397d74e8cbe3f5d4390d20cea388fd30bee302bb2d6d82031fa27ad0075ea877ae5616a9ff351d4a7777b9a4fc0fc221704d352570bdfc62b36896890e367e1ace3b90526db1066f96da1ed6f005d80b3318afd023354a4d8861c93c6301a450d2e5c3bfb5b6bc1ba32dcfefbc7c6563d5cc951c93823159e9985d999d5626be05479e2408f68a4a827b42b21c7ada4f9ebaf105cda829b785fba63e4f571583b5db6e57dab3545e100a873222e270f965b47b8655b8ef9ee8e7d807045b81f4e589374cb0b367f6407967e7f1ee9763a0fd1d1a14f10541d738fd16669f70a7f9d7d02b6169cd62e6f131558e9e0dc23663dc39dfb1d57c8e207f6080b72fa8585f65f120d24c085d658110ae231a6666dd3242947b6aedbf138207bea21d3a3fce670188a22bb94ff6e847fd793e0555970037120b6775212f30d7d5b0e74633505538ceecc3ac65934d43bec1c442246d64333671e8015fd1fb1c7e9bbc83a8d0a19be22ea7ef3230a43cd6f7831d24b2a5a8f23f68176353fae09b86e3e8a354eb41f6fb2b217c53f5bfe670649f1f09410a83332040678f98ef57901e8fcbf1ddb509c6e42c1f7403c62e11235b5a2de66b77ea93f0046d9aa372be17138868a337dd135652fe9fd5180e6d7073a88d9142cc38f2edca4184b35116b9c6dd44bf8204c0e72d44601e3a47ae14428b54097c0ff777b38a68f19e6a970b972704f69817619cc262c32013ca6b2e3cd25eaa5c62dac135c8e4108ec84b3cb5ac638df53244b70987258ec82c8e1bb070f55cb4af494a166d137ed69646a2901df6b1d578ef88c21796b949d893853b467bdaacb652290e5de500a8d4ab7afdbf994620273c56210e70909ea57bcc6b76ab9bcf097421c791ad10bb9b7f6f21634b5c94de0f79df8f2cf8e6f06da85435d87a5c0fe35dee8a02ed03e6549b22daaf6bbebb9992c71a865698e52fab41a87bd200ea54046c9dd8b066c7c27206312ddd9c123406371dd44d572fd811fce01d8546ca1e7d3feb4c39726e351b75cb36b19a39467385690cf3913e3b665881de4a7d2a2e887d18ea9e5d815d31da1df9abe43f645587be119b2470db90615ba29b5c4106f075aa4aca347f4c5013c619ab6b1fcac111bf20dc126d6faeeda2c97da2e647868e42843bf557ad2605885120ce2e7cbc31179e78fd649408e8f3fa3091874e5c16e296f73a00f83bed8aac7d0b8ef26a7663ef05aedbff11e1daf1ebeaab821a054480785f40b2b60c39ddad1461252d61be79e50e24c974c4c873827e9045849b0ecff4de97d7a3ebb48b113948c39fc381c746abc5aa96bf904ee2a220a39af29905a2d53491a344225a07b42f924336ad3215875e5adf96b8d6d6cfcb8a4b798b18c4e8de13b0c541cb6f7c31e53fe993e0fc1fe2d2d42a8f1c4134dd6986db0501ec4b215cbb224a6f8354441e4a97f11ca0bc7eb4b89c07f45523dec35469f548c50dd287ff28d9feda687fa769ef157f52d891efc008a1575c779412b89b6333e42d2927368c22525b7273dd64cafe50be73a37befb16991cd20b59630369a092cd394703b3fedfa8257f32400ceda12bab1a53f350e4c3508dfd65038236a846dcdfa08a4be4558e71e2f529ba12ad358a4dd5c63270186925c6dbb4b9a853d508b54d75992cb7a48fb5e19079c21b819cd622d12fa678f27d79b61c1fda882702b4740a85658e67f09de76c4996329a44850f10d29ffbe1901384159d4e3cdedb0f6cd7c42d2056bb4df3559da9683ffb5467667e6adcc276f6f9fd3c9fc80e4e2648e05bed9facb0cce7030a1516b9ac17accae63ae1c707db8587ad870a183788ee0bae9c9d5807757d4fa623e329fe4e5f474df465f459486fcd7552b4ee1b11dbd659b4f52f195ce0798119856c522589f7fb86a6cdf75a0fc4a7db58cae4fd0d5560dbb1575fc850b2dee48252dadbf24d186d28946d35ee399ab09a4472a0e0542fb27f79028aaa761e7543696db3da8e64787c30bdd65a5e0de2556c8b0420361fb783254b0d919ec5338fe3ab52f5db05d8cfc1bd049ba2fea3318e21ab5ae1aada6e48ab6c9f5e835dcae314c1a5922734834c11a8bf88c1929eb88f50b070d36f7acd28a3665b3184ed8dc128a7b9244b65473fbfa53c0589a9b52979cfa622c71bef560230f535591332cba9d0b3d95fdcc9cfbb06962c9b6f440df632e10c0bda5d0901ffb8f181a9628d1c36e7763b090a54bf1a34e757af32b7e0896b9c6aaa5db7789b6d67b36275ed493f1e7e4a79097cf0f44e29d1384a1f67f13c1ba27edc11393eb943b9a56491cf489715df2103954bfe96513371d330025ae5dab85bcf1b67ac8d2bf2a5c8ce919de0df452746f343b5332c51b3863cff264251899d3457faaca70df2ed3da7c2c31c4cb9d35530a470940766c65c1cf255a9dae481f440ef44a790a0cedda8759fabc66e2bfc46107022942ba3a7c2b54bf0777dc3f52e07d2799b6ec728066517e3e0ecd8a09304571f038459f5420e9d40e5dcf0f5fd214f1fff200b468c4c4bfe4c9bba98690d1f4fd0bd8016e640b3551967c7cc67b7274f2d5f35b4ca1c06048108ed6b718e179d072e608472faf4fa159792c4584815b7de5097ab861f4708d6782c2053b176d80d2fc2b19b35299b0c1df729d663f3ff64408be461cc31d876fd6986b896c0ec414ed1dced80daf733b2382879129ba4ba355d6f218f4aa8d940adb5178a3521e0dfe1c1daaa67f795d47441a2d3bc374db2be05abc5f722c8f856958e66bf548266bdd23ab41723f7fd11331e81574f798ab9a0380f406e170279ee2a2e29df572be4417e88cace5d45e82d86f0878e97d894105a9c44af69f3ad81cc8965df5cf1da522d269b369a631123ad24a21c529367054838e9a319b59daef998c44ec231af2df2e62df6d9bae36505096ba2ac9ba195d88bd3da8a9db3d875273fe8e2cc17c5047a8dda73fbd5150ed7ea4821f4bb21ac1ab418467bdfd283fd851a418706c12556c569cff168832384a7ab3121618e5a6be902fbe8e7c6e5dcf9209ad48598db93ad3ee3505b7388b84fb26deab15ff9246751323cbd8de8934783fc6a67154fabfbe612839d652eb3f89cd54254cf0a19c9e6410edef0329722e60985fcdd6d9d0112c447d468cecd20030e28cb4fa2834c2d031800a67f1c18a883ea5ee9a292f41b2772d19456d6bb54d2fcf3b3d21b69a914858cdb703c24b3e04a5ed01080df95390627057c793172d2492e8115f142e7f06eb942c81db9aa8319f084f89de1c3889ba9dd9e3d4055ee910e58a29191f36404b62a75752b00cd5042644a237c4a584d93e2df47a0da57aaf41d2a1b5d6ec74c9b681965f7eecd7beafd304a5a99f53770dcf4d31d843b4cce920d71551204898ad29042d37769b23747cf0dc1036ac2b44f7d0d2c277fd0884fb5e1982f46d1bccc029f5557e0cd6f2359ed1f7ce8c50115d5fe4b25d39416ee3496b3d15f3fa4f116a48b05cb98f3f00533b5d5043938b45425978627956a5eaa9e7577102ece8dff8eba6151df05b8cf7d7a7fdf3c4179b81ac1d2dde05a8079ed3ace5bd427e81f8bf89b34b4bece5e3a13fe7e88c62faf2c7471669f500a9607a2a78d909bb56b3bcdb4d98f1c69362d143ae401a2d8c41f6d32353cb92894380cf8c6018ad40cc71d9780d3d28de16c60ee394c313d1afc04c2d862619d018ed3e53d06ce5f6c4526fccb31fd2244c552f8d1d870488dbc824a81358032361aee744e93e66975b821e0b5eb7ac0793b672ecce8ee8fdbfce580120a470fd3a2e84ba01e9b2a76bdf60ff397958cca42bc0c2a1ce6caa3ece8764c9bef1b3d0d0665f8c79785135a188dadd9553b44f90082c3c7c2c875bd4fbc262d264e5cee36b0beebff1d914d45325aac2e45f257dd59c86ba256454f41274b023efedd37ceadbc9dc92a0d009ebe3c45f5aa2c75d44c52f839569b1728cede8983c8e82720550d5c79f9c6d1137df6627dbda7971a67ef61f969828c3edbdda4dfbeec825a1853e5a721f4dcc8f01d94265bba8953336b9796e0abc81cf0947486a4a84a167473c528a27a3eb0e50d3633711ee0230deb640b4bd89db7f846fab3121387ac42678b1b39664667056371b978d017dd760ff87084a7b50d1071c4431c510b2fcb338312640507fcb3d0556f91334fed409833007b7117984db9e8b4c0a827b08358c58400309adab6f236991f6698a7fc9d68a48c5931df54da7b6c62ad990b050c4d99530b4835b86f5e75f65b1df1a072733a7d2abd75c502e2fbe4278a87232a8437a5f69aa621f5ba2698ecfcb3b772bdb29f285825715252332a41df46338cf7ea4ffa271df466d27989fc9dfd258e4511cd1e5e573a1360c1275c1d0f2a96bdeef8f8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81e8943c, &(0x7f000004be00)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb78e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f000005dd80)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000440)={@remote, @dev={0xfe, 0x80, '\x00', 0x11}, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000620c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0xbe, "6ca0ebe46f5ba8"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000080)={0x0, r6, "e8fb5b2b20b20c7697d1996a404cef232336b71c79a4eb306e7f382e0395e27f158ecd8a5f28b1fdcffea6df556143df2aabb72d6e116e4cc0f14bbc4473bbab7e90dc7a369e9bbf6253290368e85c28e4f4a1a1a21992f8cb84c8581001c57c5617082c67ca9bf3d28c55134a60ff81b62275163065258e40db4450b469d9b861417fd0c31c294175807eed70530ff2b5260573f39d1f8b06c454f6bb81627aa5b7ff71fd25e04cf022cabc1ab36b22f6a4ff3dc6c684a1cfd8cbd1001dc0847b36a4d9708953497fd0bf91a5fac65850c0c8a91d31257bd701863549f74dcaaa08c745f6361091aef5693f0c2319a80e893f3c6616503664812da758b019f8", "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"}) 21:20:37 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:38 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "078cf0251c0e00"}) 21:20:38 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 21:20:38 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)) 21:20:38 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:39 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:39 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget(0x3, 0x1, 0x284) semctl$IPC_RMID(r0, 0x0, 0x0) 21:20:39 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$capi20(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0x80044325, &(0x7f0000000040)) 21:20:39 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x28}}, 0x0) 21:20:39 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) write(0xffffffffffffffff, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x252a, 0x0, 0x3000000, '\x00', [{}, {0x801, 0x0, 0x7fffffc}]}) 21:20:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000340)=0x4000002) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "5e0080000100006a00"}) 21:20:39 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) write(0xffffffffffffffff, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:39 executing program 1: perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0xf}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 21:20:39 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000000008c0000000000000000000000000006000000e47d00000048"], 0x78}}, 0x0) 21:20:40 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:40 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) write(0xffffffffffffffff, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000340)=0x4000002) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "5e0080000100006a00"}) 21:20:40 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="580000001500add427323b472545b4560a117fffffffa1000e220e225f000001925aa80013007b00090080007f000001e809000000ff0000f03ac7100003ffffffffff0e0000000000e8ee00000000000000000200000000", 0x58}], 0x1) 21:20:40 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x2000}, 0x40) mmap(&(0x7f00000fb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 21:20:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000840)=[{{&(0x7f0000000040)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_ttl={{0x14, 0x0, 0x2, 0x80}}], 0x18}}], 0x1, 0x0) 21:20:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsopen(&(0x7f0000000080)='pipefs\x00', 0x0) 21:20:40 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) 21:20:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:41 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x71, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000240), 0x1, 0x4000) 21:20:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x8000, 0x0) 21:20:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000100)={0x0, 0x0, 0x9}) 21:20:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:42 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x8000, 0x0) 21:20:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip_vti0\x00', 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 21:20:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) [ 3103.045346][T32644] warn_alloc: 1 callbacks suppressed [ 3103.045414][T32644] syz-executor.4: vmalloc error: size 4096, page order 0, failed to allocate pages, mode:0xcc2(GFP_KERNEL|__GFP_HIGHMEM), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 3103.069122][T32644] CPU: 1 PID: 32644 Comm: syz-executor.4 Not tainted 5.16.0-rc3-syzkaller #0 [ 3103.077610][T32644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3103.077610][T32644] Call Trace: [ 3103.077610][T32644] [ 3103.077610][T32644] dump_stack_lvl+0x1ff/0x28e [ 3103.077610][T32644] dump_stack+0x25/0x28 [ 3103.077610][T32644] warn_alloc+0x4cd/0x680 [ 3103.077610][T32644] ? kmsan_get_metadata+0xa4/0x120 [ 3103.077610][T32644] __vmalloc_node_range+0x12bc/0x17f0 [ 3103.077610][T32644] __vmalloc+0xf8/0x110 [ 3103.077610][T32644] ? snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3103.077610][T32644] ? snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3103.077610][T32644] snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3103.077610][T32644] ? snd_dma_iram_mmap+0x220/0x220 [ 3103.077610][T32644] snd_dma_alloc_dir_pages+0x2da/0x530 [ 3103.077610][T32644] snd_pcm_lib_malloc_pages+0x7b5/0xe00 [ 3103.077610][T32644] snd_pcm_hw_params+0xfdb/0x2880 [ 3103.077610][T32644] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3103.077610][T32644] snd_pcm_kernel_ioctl+0x21a/0xfe0 [ 3103.077610][T32644] snd_pcm_oss_change_params_locked+0x5c88/0x8210 [ 3103.077610][T32644] snd_pcm_oss_sync+0xadf/0x1bd0 [ 3103.077610][T32644] snd_pcm_oss_release+0x219/0x4d0 [ 3103.077610][T32644] ? snd_pcm_oss_open+0x2e50/0x2e50 [ 3103.077610][T32644] __fput+0x7c4/0x10a0 [ 3103.077610][T32644] ____fput+0x37/0x40 [ 3103.077610][T32644] ? fput_many+0x370/0x370 [ 3103.077610][T32644] task_work_run+0x173/0x2b0 [ 3103.077610][T32644] exit_to_user_mode_loop+0x3f0/0x490 [ 3103.077610][T32644] syscall_exit_to_user_mode+0x7e/0xc0 [ 3103.077610][T32644] __do_fast_syscall_32+0xa5/0xf0 [ 3103.077610][T32644] do_fast_syscall_32+0x34/0x70 [ 3103.077610][T32644] do_SYSENTER_32+0x1b/0x20 [ 3103.077610][T32644] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3103.077610][T32644] RIP: 0023:0xf6e7e549 [ 3103.077610][T32644] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 3103.077610][T32644] RSP: 002b:00000000f5e781a0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127 [ 3103.077610][T32644] RAX: ffffffffffffffea RBX: 00000000ffffff9c RCX: 00000000f5e781f0 [ 3103.077610][T32644] RDX: 0000000000004000 RSI: 0000000000000000 RDI: 00000000f6fb4000 [ 3103.077610][T32644] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3103.077610][T32644] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3103.077610][T32644] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3103.077610][T32644] [ 3103.323434][T32644] Mem-Info: [ 3103.326631][T32644] active_anon:5411 inactive_anon:152036 isolated_anon:0 [ 3103.326631][T32644] active_file:16674 inactive_file:68123 isolated_file:0 [ 3103.326631][T32644] unevictable:768 dirty:103 writeback:0 [ 3103.326631][T32644] slab_reclaimable:9549 slab_unreclaimable:57078 [ 3103.326631][T32644] mapped:22491 shmem:19023 pagetables:3823 bounce:0 [ 3103.326631][T32644] kernel_misc_reclaimable:0 [ 3103.326631][T32644] free:176663 free_pcp:23443 free_cma:0 [ 3103.369121][T32644] Node 0 active_anon:8784kB inactive_anon:570336kB active_file:23452kB inactive_file:220844kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:75656kB dirty:380kB writeback:0kB shmem:30364kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 376832kB writeback_tmp:0kB kernel_stack:6448kB pagetables:11940kB all_unreclaimable? no [ 3103.401205][T32644] Node 1 active_anon:12860kB inactive_anon:37808kB active_file:43244kB inactive_file:51648kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:14308kB dirty:32kB writeback:0kB shmem:45728kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:976kB pagetables:3352kB all_unreclaimable? no [ 3103.432591][T32644] Node 0 DMA free:4096kB boost:0kB min:156kB low:192kB high:228kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:4096kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3103.459947][T32644] lowmem_reserve[]: 0 905 1218 1218 1218 [ 3103.465994][T32644] Node 0 DMA32 free:38336kB boost:0kB min:36008kB low:45008kB high:54008kB reserved_highatomic:0KB active_anon:4352kB inactive_anon:512908kB active_file:1204kB inactive_file:176328kB unevictable:0kB writepending:248kB present:3129332kB managed:932648kB mlocked:0kB bounce:0kB free_pcp:45248kB local_pcp:23068kB free_cma:0kB [ 3103.496748][T32644] lowmem_reserve[]: 0 0 313 313 313 [ 3103.502361][T32644] Node 0 Normal free:15512kB boost:0kB min:12452kB low:15564kB high:18676kB reserved_highatomic:0KB active_anon:4432kB inactive_anon:57428kB active_file:22248kB inactive_file:44516kB unevictable:1536kB writepending:132kB present:1048576kB managed:320516kB mlocked:0kB bounce:0kB free_pcp:13336kB local_pcp:6508kB free_cma:0kB [ 3103.533294][T32644] lowmem_reserve[]: 0 0 0 0 0 [ 3103.538272][T32644] Node 1 Normal free:648708kB boost:0kB min:41488kB low:51860kB high:62232kB reserved_highatomic:0KB active_anon:12860kB inactive_anon:37808kB active_file:43244kB inactive_file:51648kB unevictable:1536kB writepending:32kB present:4194304kB managed:1067980kB mlocked:0kB bounce:0kB free_pcp:35164kB local_pcp:11216kB free_cma:0kB [ 3103.569599][T32644] lowmem_reserve[]: 0 0 0 0 0 [ 3103.574747][T32644] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB (M) = 4096kB [ 3103.587509][T32644] Node 0 DMA32: 796*4kB (UME) 224*8kB (UME) 135*16kB (UME) 193*32kB (UME) 77*64kB (UM) 21*128kB (UM) 6*256kB (UM) 15*512kB (U) 2*1024kB (UM) 1*2048kB (M) 1*4096kB (M) = 38336kB [ 3103.606359][T32644] Node 0 Normal: 126*4kB (ME) 122*8kB (UE) 77*16kB (UME) 40*32kB (UME) 26*64kB (UE) 9*128kB (UE) 20*256kB (UE) 7*512kB (UE) 0*1024kB 0*2048kB 0*4096kB = 15512kB [ 3103.623694][T32644] Node 1 Normal: 747*4kB (UME) 537*8kB (UME) 185*16kB (UME) 32*32kB (UME) 18*64kB (UME) 5*128kB (UM) 5*256kB (UME) 3*512kB (M) 0*1024kB 1*2048kB (E) 154*4096kB (UM) = 648708kB [ 3103.642438][T32644] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3103.652304][T32644] Node 0 hugepages_total=2 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3103.661904][T32644] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3103.671756][T32644] Node 1 hugepages_total=5 hugepages_free=0 hugepages_surp=3 hugepages_size=2048kB [ 3103.681191][T32644] 60851 total pagecache pages [ 3103.686136][T32644] 0 pages in swap cache [ 3103.690376][T32644] Swap cache stats: add 0, delete 0, find 0/0 [ 3103.696729][T32644] Free swap = 0kB [ 3103.700531][T32644] Total swap = 0kB [ 3103.704510][T32644] 2097051 pages RAM [ 3103.708401][T32644] 0 pages HighMem/MovableOnly [ 3103.713320][T32644] 1515741 pages reserved [ 3103.717655][T32644] 0 pages cma reserved 21:20:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x71, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000240), 0x1, 0x4000) 21:20:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)={0x14, 0x2, 0xc, 0x101}, 0x14}}, 0x0) 21:20:44 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:44 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:44 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:44 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 21:20:44 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a40)=@raw={'raw\x00', 0x3c1, 0x3, 0x4f8, 0x0, 0x168, 0x0, 0x338, 0x0, 0x428, 0x250, 0x250, 0x428, 0x250, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x338, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'wlan1\x00', {0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6, 0x1000}}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "48c01c5140d722edd3fb24545886bbd1be494201b4000000000000000003"}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @empty, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@inet=@set2={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x558) 21:20:44 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:44 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:44 executing program 2: syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="eb769045584641542020200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000008000000008000000880000000f000000050000003412341200010000090301", 0x6f}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0x1e0}, {0x0}, {0x0}, {0x0, 0x0, 0xde0}], 0x0, &(0x7f0000013b00)) 21:20:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600)=0x0, &(0x7f0000000140)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x880, 0x0) io_uring_enter(r3, 0x6670, 0xd095, 0x7, &(0x7f0000000100), 0x8) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000ac0)=@generic, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x5c, 0x0, 0x0, 0x0, 0x2000a00) 21:20:46 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(0xffffffffffffffff, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x71, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r1 = syz_io_uring_setup(0x3ede, &(0x7f0000000180), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) dup3(r1, r0, 0x0) 21:20:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:46 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:46 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000600)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/4, 0x4}, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/key-users\x00', 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000ac0)=@generic, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x5c, 0x0, 0x0, 0x0, 0xffffffffffffff0f) 21:20:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:46 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) landlock_create_ruleset(&(0x7f0000000040)={0x2}, 0x8, 0x0) 21:20:46 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(0xffffffffffffffff, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:46 executing program 2: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000540)="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", 0x2000, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x8, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x72, 0x0, 0x0, 0x0, 0x0) 21:20:47 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(0xffffffffffffffff, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f0000000080)={0x1c, r2, 0x101, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 21:20:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000000)={0xa, 0x3, 0x81, 0x0, 0x0}) close(r0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00c642d, &(0x7f0000000100)={r2}) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 21:20:47 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x7) 21:20:47 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:48 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x4, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:48 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:48 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000007c0)="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", 0x5c9, 0xfffffffffffffffc) 21:20:48 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040), 0x4, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000080)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_QUEUE(r1, 0x7c80, 0x0) 21:20:48 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000380), 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000000)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 21:20:48 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:48 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:48 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000004"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:48 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000006080)={0x0, 0x0, &(0x7f0000006040)={&(0x7f0000005fc0)=ANY=[@ANYBLOB="280000000104010400001a00f9ffffff000000000a00060000000000020000000500010001"], 0x28}}, 0x0) 21:20:48 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 21:20:48 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2282, &(0x7f0000000040)={0x37, ""/55}) 21:20:49 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100), 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) [ 3110.141739][ T301] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 3110.207184][ T302] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 21:20:50 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:50 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x2721, 0x0, &(0x7f0000000000)) 21:20:50 executing program 1: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 21:20:50 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000004"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:50 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = fcntl$dupfd(r0, 0x0, r0) read$FUSE(r1, &(0x7f0000000540)={0x2020}, 0x2020) 21:20:50 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100), 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:50 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000004"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:50 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xb, &(0x7f0000000280)={r0, 0x0, 0x0}, 0x10) 21:20:50 executing program 2: mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3000002, 0x40032, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getuid() perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x5, 0x2, 0x0, 0x0, 0xb0, 0x46, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x564, 0x1, @perf_bp={&(0x7f00000000c0), 0x6}, 0x100, 0x1, 0x5, 0x6, 0x80000001, 0x401, 0xb8b5, 0x0, 0x8, 0x0, 0x6379}, 0x0, 0x3, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) r1 = gettid() r2 = syz_open_dev$video4linux(&(0x7f0000000040), 0x465, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf}}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000300)=""/206, 0xce}], 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x7000000, 'syz1\x00'}, 0x5, 0x40, 0x1, r1, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, '\x00', [0x0, 0x80, 0x400]}) 21:20:50 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100), 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:50 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:50 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000040000000800000085"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:51 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x14, 0xb, 0x6, 0x5}, 0x14}}, 0x0) 21:20:51 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:51 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:51 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000040000000800000085"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:52 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001009200000000000000e5ff95"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='rxrpc_local\x00', r0}, 0x10) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 21:20:52 executing program 4: rt_sigaction(0x24, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 21:20:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000040000000800000085"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:52 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:52 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:52 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_GET_NUM_DEVICES(r0, 0x40046104, 0x0) 21:20:52 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:52 executing program 2: r0 = getpgrp(0xffffffffffffffff) r1 = pidfd_open(r0, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) 21:20:53 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:53 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:53 executing program 2: syz_emit_ethernet(0xfdef, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @rand_addr=0xe1fd0000}}}}}, 0x0) 21:20:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x50}}, 0x0) 21:20:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x23, 0x0, &(0x7f0000000040)) 21:20:54 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x400000000080803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="1200000000000000008000200000000000000000fe"]}) 21:20:54 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:54 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "6a129e5d22e58a9e78ad9a53736a9c55b6e62f"}) 21:20:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:54 executing program 4: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x11) 21:20:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e0000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:55 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:55 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e0000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:55 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x3) 21:20:55 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, 0x0) 21:20:55 executing program 2: socketpair(0x10, 0x0, 0x0, &(0x7f0000000040)) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x65) 21:20:56 executing program 2: msgget(0x2, 0x660) 21:20:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e0000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:56 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:56 executing program 4: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x2}, &(0x7f0000000080), &(0x7f00000000c0)) 21:20:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)='%', 0x1}, {&(0x7f0000000700)="ab3d973f76b7014b12132049fed6f3863a79f55ae113e7bbdef979a46e5a7d7b5302e6cbedbda23c51260691ac570fcd1afe698240e2e4584e67a06cd9eb50888878d5194e09c8d4d93abf77554a9fd682fe46f224a2c9245538df9652d07666d6f64bc13b66831294560ec4c8ffbda0a855746634f19f50039dbcb7b767198b66f2c9a7f27d37ae210ef23deec156733904cd25c3cceb0913d5a72929cd480a28d01a6129985486994e9bc4b204c33ec57ed8d27165332a90dfeefc1dcbcfc59a3e2510fd0d1fc090df378059037701a88e5ddca57b2edd47c4ab06d1e0939f29c49922dadc77197af17851c02db56b6fc23875ab0714b3a9cb857709ed68b718a3a82debf89434ba841ee4a05c4649825efc02040813431aec0975ea69709aaf8abdfa09158277fe5485c7f09b590f05475331ff10c07762860a7948a7f992a4dce0e644d00dec496ef3f00370a0b40319edd156c2f56204064a612628f78a8ca7121b4dd851f9caa214c6c4d1d1e7008ef0fc75a7009e6212b74cfe96cbbf13db32ea6c6068309cdc56d27ebea263c5d55ae4ace62362a4b52025cb2cf7addc762522efa395ebfdfd1ccd082874cd82b87099c95448ee028fc0ea3f761c21bd3f1fd1e10d60b5a903b89e8f147a084e07666afb6a53f483596eca47da651edb7c912be467e252da3e43b06fbda9750779b4bd5ee5fad0890687f55a7870a67db1352a2236b6f02a53f4c5566088065e3125f33fe5b12b4dca4e378d76817a0b958410548355c50df3846e1e1df25ff1389b33748eb4e60262be5ee368261e80377056ba7a3539b0ddd30797b93a2bb28e660944c987096331e7674bf0484bf19b596389580d0876245049371aaf32048101f32f35932ff344478220414d25eae659ddba18e452c468a463a40d64e5bd7d5d73cd51b8b6973c4930becf462bdc9befa8ee75bafd9c642c75706a037aab226949c5b9c7eb24dd936f9e7f8f4ac3cd79ac004c67dc44115488eafd16c57731a654c3805e645266bb7006a8a0e0fb18ae58e83218750375975c8c9d4d9f23a8a254f7cf70f62881676d7db8c8d14521dade56b36b931f25ca3af91eb736255683a78f566146d01950129125252345844223015ea5420a854aa73b0477290868712a8c82609d8ab8fa564fb1bc1c238a5a7610eca82fd77bb37f8c99d396e0b8ad1c5dce2ede053655ddf5ff7153cf5bbb5102d9fd418d821687c39239caaaee9d5e6c9d9c28f580993ab3a8b45fbcc17b0a08b1ad9284780c381d7a51526d3e1858ed7a8f47d9cfe2ed0b9da008c29e63a244da3d02258b2d4da05e834a45ca6d466ae4d8bf04e7c6539e67f59021bd3eb72217b2928d38a358416f678fd9b4caef5401eacaeffc5e521fb5bd2aa0aa1c12b42cb0fa40a9383a2fa90c66b655fd5b3f0c95bd2a239b6289844a291549cb91f78dbb6ef4454f7096f1864a8ab6bba3339ea16e22df0f0ab0163f7476442864b5ef0b0a4a89b8df270c2e742aabef3d8d5453289b784f9181a02353a6999455926fd53adbce686a14f827c495d848b95b0abd32355f700ef7fd40504716e3cf5314bf5832f9fbac3d7d06d084f54efb36b4044b0bdbbaa3fd440d455f2ffff1e2c262a91b79eeb858a508a59758f5ef99bd97aff543d7efa04499d189de94d3d222b43f24add679a645c9539728a8a86bcbe4a1340cf3783de9a975e59f2ef69e78ed4fe35430fe6d4e99f91123b16decb547a6d6d4bac4998e955176339284073853af339360025f839a7ba7fe1de9636de248378ad9f60976d4e801a5feecd0fa09312257990bcc8dfef54c7f92914abf78df4c87b4edef253c4a180463bcef9b7be57f7767f907c7dbb7a61c98ebe513535e7105fabf88c7ec298dd904d76fa6c9569e32d5dc2ecf3f47fc48ee8c250366fdbc433be623dcca6de670b79e6cc69ddc57ff996a2caf3365a6cabd7325b45b8f72820c8dd163a14b55c6184f5adcf60fd05583f5a7756e15add1598b74435fed6116d03e6a15c22c30f1ce05dc42ec6f2aa8c2648973da798a36faf2a10101b9757a8acb79189898ae537aaa82690c71244a93b60b77b3536483fd9b943ba0e2cf7d8fe3a721ad56bb8c2dba1f9948cc1fe20cd83febe0038f8f8b80fe967f2c7e15806b9f008b5c190ba061c4a16f08d464d77a548cc01ab36feb69d0a8b90d19e8aa3873c21d20b38b36b4a8fd510618efe0f55d56b516fee2f3b7bdda656be2ddc987afc5f27c61c22e4d17950d9407a93f2968942da37f8b3443e30563f47a39955e6079f95590c7d9e519e1725a420bb3d1d7aa265424a113eb3d0d34c0bb670a49806c24a9aace2f726331bfa5192b623399ffd8ccf74404a5a3ad05918820e70495cac814af4227ebfb4a7e3bbcca81e43691d9570578ab2a0f997422ce9bb7ba61c9c3218f6d064d06605934b37126c84980e81d8dfc4eb15e86b4184ddeed91fb18bc13836375df5df7e4bc5cbe35e789afc744aeb07cc778b7493d0ff6d2ad1cd8bc6ae123625ea3b3d6a4d9558f27b169542385c1b40c2ca843a414c7dd1563fe02a6b9e1668ae1bdf89d624ae617860cbb2e4365f8236af0a328dbd3b47a84f3a82b499166faf0108a98ff42df290a49409a7a7eab92bafade451fe1a0489f3d7d2f487e77053eed36854b134562eb5f6f46d4225824a592c1bee1f7f9a3f714f43e59875d0386b8f3b437236112115c23cac643ba1585b78f30ab13eaeafb862965a5fb1c744c6d03a3c45efc16d4d511c45d9dce4cef61473a7ef7b0a5c001ffbfc7bc1618f1ad75cc226805e369942e6aec4ce02b0262f0ccb6c0fef82bebcb3ee4a54ca88e5596856ed0d395076a2e6ae4dceeea22bde445d22cfc9ffc4bdcf7367db5590a642674e6d15b5b20f75247a1dc15035fa46d4b1e6321093f4a010276006c3675391a67eea87ee88d16526629b67cfac582a0c71af12d8e39346277bb711f18bcb2bcc20be8abf46565f637bad51165916f3c09ae7fad7f2a96a65aa61be070342a02b2a9f65bf5d56057309e33e747aef7fb506ef64cb824087f22d10bd70122f799d9adc1ec57faac2af3204c3f1addec24d59201aa10d703d9848cf590d2aa934b96daeb3c537e2829a9f0da3f0079af627ddd59bc5c90cd2aa18c3783e72e61bb8a4632c9884fe7562360dba85425266e31342cb186508e3ed8381cbf435cc10809f718f498f804b7c382e84bf05693e71fa555d56960d07fdeac0bc8e934a0f8a01054113331d5a3e16fe2a7c5f27f86f4109d8cbc24e418e1b4a7291c64b9d820bd452c6b8928678effc4b2cbbd2a516845dc3a7a014a2ad5ca9f96d9f1a93efc8650d9b73d00791127383997cf06f0cbb9dd95c8cc21cfd75b1d33b4186713165e3da75ee87eb92c1c5a270d1977ce1779870bbef3d806101105bdc905a6945d9a550dd2c5df37c387ca2e42f1c51f74ad623c704aa2d8748487462f2b67842318722ab55a179d530338874acc89d86a787a34dc90fc57722868df7dedb035ad9122bba8bcff13fec4e55b287aef1f9d813fd5c19c4325afaabede2e0d19daa555953ec3e37358041bf33144fbecf1b41ce202ef1f226a5cbe9e5c985e5936ab7da16ca93e7295dc7b7a58b74a7bdb7798c0f9d23530956b9e86fa9972684ba85c1581f551534e052e95d32c7f55868fe1bc3e585655664b344c6d402053afbf38187241e42fb40fb1b889b896d6ef112982f0d5031af8b08fdd9143fcf57bd69d1439b5bf1f6971b37021935885b3327a8046e7a8ea812f2d88909d4633debcbff87099d5463f30c78d00834ba56eaf4fc8e346072857f234a7e2ebf5ad882a5c5856a1d540d9934995edd89f687033a3c5f1544b0171436fe4a9bb75cf3b8261d36f0a3ce82cf6a50faf8e75e800a4a4dddbe0b13b22e5099ce67d1f13c9cd5e6e96cf6ec73746fbead9bb1a31ef6da700a515c6bcf8e5f9abc5dcd74682cb9f5935811749cc5b37fe9fd547c0d7130539fefc7768142114ff628718050521a9624848b98b53f64746db20bfe09980d50e9cd1848f2b8721edd930ed875f7ea8d555365c0d18e934803cc3d3077355150e82d211640e611a7aa2bd598f77ff653ab621aba7fb689236a283c283ea8b7429d15e9ad8011d19dd8d854d31a67178a6ebd010107981f3df544ec8989b2399fa7271e3ff1b09d05d67f12c89a2f4ff287f214780397e2b6d3eb1f1e5794208f12123c3a51834b07d49053fb37ecf704a24dad3042d8d9e96f1c23243e6b50a6d9263e243f93efb63d8b53409459af9b1b0a0c0e8fea9af38ded8433f88762f9bdee172463bbcce421a04239f5407dfd2b5ff2d6410fc1e81f69265b0b1fa46d335c67d6fbbf4c3177b8c857d6e6836c1e2bafb8a67d8076f28dd7737a287617e24e58cdf3bfeb42575e8399a86ef1513d27f45dc94467a5232d41cde3b7c60abc47458c66ad78891189a1d0ab3f0f781b7c044a6418adc7331ed3934060fc05f0deb52401399ee8cd015ec0e2c47a0f51f22b1e9dd2fb3ec090cdbd4c1872db6fe4225765cadcd611f74a27858d43c0b3b57a1980ecdc25916fec81c9bcb76effd833b3f30c95cbcb13ba76cbc175741a7e1422c16cca5d110a28bf3e6f94fb732cdc454335b162f3338f61100a6ad7a0667a92274c0cbfbe6245aa2b99462ddf8b7c817db33509223d386cc6ae4cf863cb4224cd98551bb1ab96d93d2f7cdd12600019ea87fe0c73d6c61a03213ceb6de72aeaa65610372a5f0758522124611a193f61d6f7174eeed48f1400501f5f84e92adc42637e98ee18f1928072defbb29993b3ec28ef2402e0a1b9faadbd5962cdbbd2421a2d52766605af41eb82af67e2e2858c855893ffb4af33f56af7208a7c676a6375ae0caac8ff5868e01563dc7a3b2dc71fe1d8d1df6943a52695c82ec5a4f3d5f902e0a24f37c15cd6de3bede4dbbb0f929476417708d3f1c00062c11a92a36a7c3fffe4073be92f7304028a042b9434a2fa933575ed432645e9f3b8742dd3dd5273a6a7dfcd192349aa01fece967c42b441e33ed13adfc96b8bde2fe3f38029606a18f4314b9ff0f72d6f0aaff5a3a818a029bc15a6cec624342f1acfa042e2c4615d28a70af48563c806019c1b5a7e861c4dc28d9fabb201bc4f6b1617cf5c71fa953c6318779b7349dd4d9c1d8e980f5790393042f6e2fe7ffa4bb56fd4c3ae110e9d293bacd9af1af0a5caa4a7919e5b950b3ecdec95d547a0cb179b99031cfc5b21c728296c6b72e96ee34a6b2a4ec7f55b2e62a7c75a41528bc0c804723ec5050623ad5d0b6b31520f74521ba15e72147a441fe3006c4ef9a7f23f4fd3ad69d795250a5944fdc60131763ea3dd09650d0132d81ead99826604a512b9673fd1cb340323295b991149d7dadb939eba3885adf1f74296771a5dc778e817692ed9e3531b53049c80da8ba65397f69cbf2c352caeb81751766b47ed1ec2b7106265b133e4d4d52e5b2fa75be714e388a4276490a8081afee03b787c8c3e32a67b35dab00827cb35082f9bcae7a78572818b1cc264cfef25e86bbd989fb0db26ed1b094bc00970266fdb826a4bcf4a6cb1ba94d553434ede168a78d7c0a54b0da1d585e41297200dba4661ba0a7972901a6bdb2fa0eb28798bcaf7d299bf8cde98d7a60e5cc0f31aa645f3ec1f84b43d5162c7e5a7ed980ab8b4941fcb56a435cea0f88a8ff361ce930bb6dc9a87cbd52c31598c34590fb43c1e507da8e092198b060fd5f09b310ec2fd6ee04fd2d9d9491", 0x1000}, {&(0x7f0000001700)="d46d85ff161401f8cdeb19ca1aadac4e5c3541964a30842a323e7ba0d952b5a5bff54c4ace39b9649070272ccbf104c5897d79a6588e54c08b3075a1b05ab371127fb2b184ed82b79cae2460c4acf345dc13b64a8f23a37130880f6e86e74bbfae7f126c0d64f7fce77d0e5ec9a8f5e0df4c0d64357765d8e3368e3c706d71ee29ecfa45a9ee6520a9eb21ede1ee33be057c8a2a61c9c14e32b13c129ef980373ce4921c9f9a187c1c9c5e48aaf984e4828869bc3590883e018478c262910d65143a3e19a9081b94bf458624e600ff12154c73715a96a5ec472e8428153bc37586c99471633d6ce68338ad8d1775320b45dc56b27258d33c8040ae0d170612e3898528b4015892fb84445189e5e1ed7480a5233814370b471a870001ec6152ee4c8c3b0686e5afa71f3078513e52a5064b534429aae1511d4ece41bd7d9c053147735711ccb8d9a6ec21a473bd649ae5a4a83944c6226b2f71d69ac8e81f8c13ba057a28f06c9b32f2a61afd0dbb1801f0f7471f14c8ca317c504901221b72e06255637319b3485203553cb49883abbf3c7cd2ac3f1eadd66fe27563632bf9b43fb56b8ee2e99284315c19f06f4afa02b3f03415155c4993f573c576fa7620d0e274e7f0770e19844bb4f34a73f64d0efd17a03cd2d0add7896510a1cd33563347022ddc18e713b041f808a180737dece787a438d77edd137ead39544bca7040bdcc741262ef816f344e293c8878ebdef2bb2f8c1440198b46c71a68b6643b6c4d0050af825634c0b25de4ea10740a522469756cc1f3ae5724dc823c67d616eb964696060eb1bbe0277066f21d7afb0ee4576087e7bbbcd6d489b635fef80f6f5329a75058c81b381a8aa0b575956ee849fb9cc4587497ce706e47f44fc261d7f63c421559ce2c5ba2a37d15f226e1fb5edbfbbb026e74d38379f6ed0f4cf5bd3eef2d569ac2d64a8594423a105771d5c7f6fffbb2855ac20d41cba0d7ba0aa982c65c417a0d59301003d28e1eef57001defd91c67dce7fdbad9f163b7e5e577fbf75c492a37f157c2aa52f19001f25bb0d22d8ea5da3646627d0aa79b00abb9d07aa444d3effaf9b0dcf6e34ecfaef2c92788aaa3eb2d83f4ac108ccd95de001931d4d9952fd5d9d0cceb0068b57750b8c172ab4628427bef3685fa25d3e9901bb9dad8a92dda328fd2699ab199e15bc7ecf9095fe1ee3c20d67d7ef8305d85940d0b62df7ab6411b25139b17ec6c8f147662bb87641035c01a8b8c17c884ba74840222a9071cb6fee8c08547f5c8ad2a3b66ecf7aaec7b29e360fab1f758286fb5edc874db1460f527ecb452a93199657733f47905f14720205c2a5a9c6b2bda421eef674db74c69283ed85cf0bbfaa1c9e5710a453ed5815a04f4aa91d0b9558063f2cfb02feb52f78e8ae762a422f4cda49c68d80d6139380eb61d89b531101b600f78375f68a37b6e7af196035fa90590baa01c83f06d7553f05a6e9f9166b01800b8bc6f7838e7f784831ba4db17ba6da6aa43065e3ee16eb934bee9be53e59d8a9359d88374f7d7056ea2bfd118c0f1b256864158dfc926b46422da9f283cff5bf8e150228a4a1305f6e40f5041c49a1fa2f906fc09358dc9005358b9906526e412bb25c292a5049b01211ba924eaf1c415585f40928024285c5de05ef3c142749eb28b14eb8fd67e74ad063d7fd03cd58331b2e8eaab5debac611985c30dc78cbc953e0bd1c1d5d2c0c885b42776067663fe1c28bbb01c8d9bbec7b237e3df3f4036a0e179fe6ff71b8b8d2e95513c65614484b26449e59dd6dc20e21122243f5e3e2292f57b721e0d8e5e7d280f161395d2fa6ca96e1c4635fc3f852506460bc7fa4d93f33f0472dfb16fbd8040cc7fdda0ba2952294bae6968939fd3740398dd9c9ac90991d3feba261a999081744364c9a03a017e9f73061a5c904cbc04c4a25180f234d5ad74841314a4c7b1e6a246256544cf9bd7e19bd5e52982159d2f4e77d2d7c8f436f67e77a4117b02106c0c543714f9189f2a6eebb23662fec29af1ef8bef12fc1ad6c13eb9a74beccaa1568cefacea680ecfafd2329b4a8b321c503973ce0efd4775d818f12efb26c94ff0cccafe255c4eec9a4483f9392999b07e80b41a107c366383646bf2ed9dd0d6ea2db1c9c4d9f920ee73b3fde48219b14175a479da51fd37470876865a44169e444f8543b251a6ccbb79b939c046ff7e614d1f6394e7477836f1f6e14e0b78505006d0ceedf833ae04af6bc43de3339c300c8b0c21e0b432110d8b876c78116c70ebfdd3011748f08770582ab4f190ec7bc33243b670f9900909790695dd77a5e12541ed6788c607e324a47b54e0b29f5fb59e9d2cc6205afc3fb0fde3efbc487255d511b837ae6bb56835f7f6198ca3c6e5d8ab0bd11e0ecd2ebccaf753b1192133476bb838b17ff99cdee2e44b47c383a7ae7af7fd6e05b4bf23745fe4aad41656367c049cc647c831d28193210bdb0b158f5da32af74f0eb5eea7e42aedae09dec0479a35a492c163c35eb42f126e8875419c599b586ecdf5b033cd21589de3f45e8e25383ca999618d3a9321d0d333825b570488236795402de0b0c7bd637c7d75da14b175e336fea32dc52d4bb987f0e749cd5def4f3a91de00157a4994e1b4bfef56067e8a0f31f09ca991b76faa937df34f7436557ee6ee803acb0426be7530dbb2d2b62e8d498e9f0ddce83fa02fb8352d6cfba5b952e125bc215f8f3f19dff0c7777589c390de8371e6879ae40d1edfa38b366891cf01c5796b5cf16c661fda2aaa44242829be0987fb18536ba1257c4065ad35920d41a593caed8ee8e8ec7e16cede09da99e8a589fd14f94be82eff703a9245bf6c424d83a38e1730422a89754354663ac0ec50a6a6c4df9e94cdd244b50c66d07a0b0e4b7ed168fa78212c05676a08410090fbbeff3da8d656c26c8b6dad14c28a8f89605c71c1a0fe8180b35274beac183a670a49773ce3319786564a15f847a1f091ca950335e639baac23c77edec2ee8fc2832f2c8b0a852e9a40533dc59285b84ae0c02ffcbf30d63045f640f1cf371faec73a496673ddd8c5c3f94aec1f832adcab852d384570fda62e611bff5524171e08efbe909cca2600d07ba986974e184bfb8353f885e2e01ff6eb7bbdd9eafab5b60957d7b59ea9d64a233b4d2da22f53e6ffa1fa78ad8e8d05076d915936899685456a4d44878618453629db498a96cb944645874e21fae6361fa548adf4643967104654fc09ee355a93512194f78be4a457c0e513e6ff850bf6340503ae5cef5a9342540fa9f2182a746c1ec76474efe069d354ff0dd2c70952b57645950b22ab6b387cd62f5b25ababa283749ac01e91f8f7811aa37932bcfbdcd65c0affa4c1dd038caa28d513477b354bd473215ce3dbcc0f7f681454d27dfdd62720c04b6cb193637f1b87dbb8685dd631fc18cf75859dc5e4e9b8ed7638dd80ebc3b1f00af63fb4292db9cb041db0559133252d9952839f445cba7c064e06b9b887eac2ddb3f3fd8c03d530932c41faa4c76a3580bb30164de67a5ba80052c896bb413c2fce3e412931e2bbf900ac26e43b5c45b8e5d5a96723774d8fbabfec6c280e08b21ce12a946c009d726c873717aebadea4c302b3ba1ce319e09fb7794b520113dfbcab2b87386240ebb92cc7134454f0ba48212a3dfb2709e7087e46b8b00afeedf4621f3d2d0c43019c9874e388e28ec6398368bf00b8d168ff11dd4361ea67c556d79615e776bee7c961ad5167194b239345fe04cc54db7bb283774c646fdf5c2184a36542d5a0c18091bf60b6a920a8dd723361009b3b2e2d2709ef6c632219edc180f77b6f0f378b312422db547b860e2c26ede3d9dc9282fc724320f6a95cc5dd8e2573f6fbd04414993e70d2cb820dafb22d63341a26d41e1031c375326fc922a3f425ab3d55f3ed714cc198edc25c0783b127d8101c14ff014bfb596535767571748e2448c93941573b84740a8b0515670c758cf788ee2a6121126471e8fc9bb75164f22d3d1cece51b7aa5e71281b624d815c56747584a86fe9ddada36249565b2c3146d3f10e4c7d14e7b9e45327bb04037144362a7e4456948c14a9f0c8d8071ae361365b921a6d4cf458ebf853cea7c156d82b41cce645bae5773de65e755a7f7e57f4fe7d14bdbc1544f482f7583b03709def276f7d7546cd9548ce05a4963bc2546e6d0b09ca3b08af51a116edc2470ae2b0a13628d2e22801659899bd74ec3f62158c8ced0e6657dd98528d45df739c7c978cd1b3bb9ffbc3e7c16702fcdb53eed8383ab500c4a93eab70c8f068cac1221753273d935fdb2a3e4021130b16bf2dc2ecd6a90357128f3b7b816bace2e0a2b97d0f2fade264651bd7e03a16be1a62024c9e8ce288c47e52c1813e89eccbf9b2e8fe583a05db7d5b650c3e055bbd1bf67f47e2ec15ae392c00bcefc892910a327fffd50efdf562dbb265c101d41d586afeadffcf42326660da1bf489d54c717b21d326cf8d6e2254b6ab0c323de56583be1e3e2a8b09e12bbff902450cf00cc88cd2e89fbe5bf4143ab4fb3b0bd7a0b7a8aeada5f37fa9f8e1048194a1c8e8d46f8aef4fd8e174f4cf2a784c49a2f96f46bc1b3f5486da4a99e889fa3a39e71d4dc3f1a345544d9fb09cc3a9fccd9884a0a8d7cf2631f641cee4ad12f69f06d1baa8d9abc706cacd7788d8682fcbb4aada75796b48a7938b11028fe138b47855e2a40adb12b1b85b995473c2dc42adb70ab69316bb0f1c95e6d3131059ffbccf442da1a929dbeb6ae4ebb070e4909158e1c003145394a7a31bed475072ecceed367f6c92a1bbf1809357d428bae71dadd695638d564e9e133d18d6886aa395e75da4b000e58940e62a85911ac908204349f024ee79ebef4a7028e89d9e8469eb18667e180838ad436516542e8653c40dc6c94ffd777840474bf5c90eac400ddb35fd0532320819aab1c91bac78030f347689e82c4431dd6d589dd2399311de3b2c3cf1c614dbb4b0a91f32f978822ed59a5271bdb89a58d08718d7c71a9abccff41e1e2e8cbb8ac447637ae8e55b0d63dcc47314a476687bd4655b1f73028c55e103586b835a0d2c24ce777c10aad9f4d2cfb26122e05a0ad8ef23e75f58ea2a88be7233027ef6edfcf9cffe6438d7e509f92e665268876c23e5548b4216b7f4802f5362ff7dc2f7c42ee85e0f90afbbb3df82b3b530e76d120f04b7195d909abd063355f1cb5a7603673f8492cca5d285ea9738d553dc1267691f7dd6c2bb1931923a3ac9f7374446ae2e445aba7ae922fb5283b63164ae0054eef6cf809633fd9bd84de2ea440", 0xec0}], 0x3}, 0x0) 21:20:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:57 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x1d000, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:57 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r5 = gettid() sendmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="b2", 0x9d80}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5], 0x48}, 0x0) 21:20:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a34000000000a01030000000000000000020000000900010073797a300000000008000240000000010c000440000000000000000360000000030a03000000000000000000020000000900010073797a30000000002800048008000240ffdffffc1400f6ff766732000000000000000000000000000800014000000003090003"], 0xbc}}, 0x0) 21:20:57 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, 0x0) 21:20:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) [ 3118.479295][ T460] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 21:20:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a34000000000a01030000000000000000020000000900010073797a300000000008000240000000010c000440000000000000000360000000030a03000000000000000000020000000900010073797a30000000002800048008000240ffdffffc1400f6ff766732000000000000000000000000000800014000000003090003"], 0xbc}}, 0x0) 21:20:57 executing program 4: syz_genetlink_get_family_id$net_dm(0x0, 0xffffffffffffffff) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, 0x0, 0x20004000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0a000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f21d49fefcafaf4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x67, 0x4b29, &(0x7f0000000500)="b9ff0321000d698cb89e14f088a8000f88a800608864638877fbac140057e9", 0x0, 0x67, 0x0, 0x3a00}, 0x28) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000000c0)=r2, 0x4) 21:20:57 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) [ 3119.086767][ T471] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 21:20:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a34000000000a01030000000000000000020000000900010073797a300000000008000240000000010c000440000000000000000360000000030a03000000000000000000020000000900010073797a30000000002800048008000240ffdffffc1400f6ff766732000000000000000000000000000800014000000003090003"], 0xbc}}, 0x0) [ 3119.487650][ T478] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 21:20:59 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x0, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:20:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a34000000000a01030000000000000000020000000900010073797a300000000008000240000000010c000440000000000000000360000000030a03000000000000000000020000000900010073797a30000000002800048008000240ffdffffc1400f6ff766732000000000000000000000000000800014000000003090003"], 0xbc}}, 0x0) 21:20:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:59 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f0000000100)="04", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, 0x0) 21:20:59 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/143, 0x8f}], 0x1) [ 3120.414905][ T495] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 21:20:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:20:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:20:59 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000100)='\x06\x00\x00\x00') 21:21:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x300000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:21:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:01 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x0, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:01 executing program 4: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807d94ad74c4f54e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:21:01 executing program 2: socketpair(0x3, 0x0, 0x0, &(0x7f0000001600)) 21:21:01 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004300)={0x0, 0x0, 0x0}, 0x0) 21:21:01 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:01 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000000)=@generic, 0x9d, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/237, 0xed}, {&(0x7f0000000180)=""/52, 0x34}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000280)=""/60, 0x3c}], 0x4, &(0x7f0000000840)=""/182, 0xb6}, 0x0) 21:21:01 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000002600)={&(0x7f00000022c0), 0x6e, &(0x7f00000024c0)=[{&(0x7f0000002340)=""/152, 0x98}], 0x1, 0x0, 0xf8}, 0x0) 21:21:01 executing program 2: perf_event_open$cgroup(&(0x7f0000002f00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:21:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:03 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x0, 0x7c3b, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:03 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/161, 0x1a, 0xa1, 0x1}, 0x20) 21:21:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000380)=""/161, 0x26, 0xa1, 0x1}, 0x20) 21:21:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002d00)={0x1}, 0x40) 21:21:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, 0x0, 0x0) 21:21:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5, 0x20000000}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x16, 0x0, 0xab, 0x5, 0x481}, 0x40) 21:21:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 21:21:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:04 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x0, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r5 = gettid() sendmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="b2", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="1c00000000000000", @ANYRES32=r5], 0x48}, 0x0) 21:21:04 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) 21:21:04 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@tipc=@name, 0xdc, &(0x7f0000000340)=[{&(0x7f0000000040)=""/51, 0x33}, {&(0x7f0000000700)=""/4087, 0x1000}, {&(0x7f00000002c0)=""/81, 0x51}], 0x3, &(0x7f0000000180)=""/214, 0xd6}, 0x0) 21:21:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, 0x0, 0x0) 21:21:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000002600)={&(0x7f00000022c0), 0x6e, &(0x7f00000024c0)=[{&(0x7f0000002340)=""/152, 0x98}], 0x1, &(0x7f0000002180)=ANY=[], 0xf8}, 0x0) 21:21:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, 0x0, 0x0) 21:21:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 21:21:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{0x0}], 0x0, 0x0) 21:21:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000002d00)={0x1, 0x0, 0x0, 0x0, 0x210}, 0x40) 21:21:06 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x0, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:06 executing program 2: socketpair(0x25, 0x5, 0x0, &(0x7f0000000040)) 21:21:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 21:21:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x0, 0x0, 0x6}, 0x40) 21:21:06 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000013640)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 21:21:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 21:21:07 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="f9ae2ebbd22c618578c3c179d84d28501f2c3f44f9ede810843de151ecd98ff99efd470e9ff897fae76540cae9cdc49cfc1f98c19978dcc77d7c924eace36e912d7937", 0x43}, {&(0x7f0000000480)="5e373cdd4713323b6044778dcb7e034f255150d125679a15147fc79aad15309d5d86ba2da5c1db5b6f4f1d85f146b4ea6a8c708707bedc54b4122acecb47f1fb3742161f7c5270a085afc5ddc01cf4e1d34cb0af3bd0dc931d53d53535ce17a15fa0d5c5e982f964560229208f6bf4530683e775e25db7aaded9974b48251c2dbc182eccd93288bf5e15ea1bc5", 0x8d}], 0x2}, 0x0) recvmsg(r0, &(0x7f0000004300)={&(0x7f0000004100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000042c0)=[{&(0x7f0000004180)=""/72, 0x48}, {&(0x7f0000004200)=""/135, 0x87}], 0x2}, 0x0) 21:21:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x8, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:21:07 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:07 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x201008, 0x0) 21:21:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x0, 0x5, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 21:21:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5, 0x10000000}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:08 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:08 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') 21:21:08 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x201008, 0x0) 21:21:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x5000000}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x12002) 21:21:08 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) 21:21:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 21:21:08 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) 21:21:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000007cc0)={0xb, 0x0, 0x0, 0x4}, 0x40) 21:21:09 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 21:21:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000003b80)={&(0x7f00000005c0)=@abs, 0x6e, &(0x7f0000003a00)=[{&(0x7f0000002700)=""/244, 0xf4}], 0x1, &(0x7f0000003a80)}, 0x0) recvmsg$unix(r1, &(0x7f00000043c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) 21:21:09 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) 21:21:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) 21:21:09 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) 21:21:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x8, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:21:09 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000000400000008000000850000000e00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) 21:21:10 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005d40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000007c80)={0x0, 0x0, &(0x7f0000007c40)=[{&(0x7f0000006a80)="5fb4d2b061bb7c4e1fcd1d30ed841b598fb9f5162e1d4ad34eb82b2400976ff07fecb97b2939bc73d6607d04f67f10a04bc2c741eff0180506d76676b26e8f4d75e94633e6a90ebfaa88f2fb792625c3ae8d487f508729ced7b2df30a6b50e30fbcfb0fe4cfdfe9b184d6da49b4d30309493f2cbe29c511d362a82049825403d1ef06326420886414a0a38aad00f709a853cc4d92e0aa4eeaa5065851b4b", 0x9e}, {&(0x7f0000006b40)="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", 0xf62}, {0x0}, {&(0x7f0000007c00)="e7", 0x1}], 0x4}, 0x0) 21:21:10 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 21:21:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:11 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 21:21:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8017a, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:21:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)='^', 0x1}], 0x300, &(0x7f00000027c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 21:21:11 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x11, 0x0, 0x0, [{}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)='^', 0x1}], 0x1, &(0x7f00000027c0)=[@cred={{0x1c}}], 0x200027e0}, 0x0) 21:21:11 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 21:21:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x40002042) 21:21:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xffff0f00}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x16, 0x0, 0xab, 0x5}, 0x40) 21:21:12 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x0, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:12 executing program 4: socket$kcm(0x29, 0x71d2da7f3ecd3e4b, 0x0) 21:21:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:21:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:12 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0x1e88, @private1={0xfc, 0x1, '\x00', 0x1}, 0x9}}, 0x80, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/100, 0x64}, 0x2) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x16, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004240)={0x11, 0x6, &(0x7f00000018c0)=ANY=[@ANYBLOB="95000020eb0040010029260c5526bb4734ad48b0a737990e22dbffa0a8d741bb1a4e8e897dbc2dcc1928964430be7902c5ba9c58ed1b34f2fc9422488506c650f1463784f805995c76c9f0efb3d6f89062c3ac79ada4c91b3f8db5e81cb2af971f6803c244986492d8cd75e81fb80ef192a8", @ANYRES32], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x6}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0), 0x1c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r1, &(0x7f0000000c40)={&(0x7f0000000bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x38, 0x4c000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x8, 0x0, 0xd895, 0x3, 0xc80, 0xffffffffffffffff, 0x4, '\x00', r2, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x40) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300), 0x6e, &(0x7f0000000000)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x2, &(0x7f0000000400)}, 0x40012002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000015180)={0x0, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x60}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xd3}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f0000000140)='GPL\x00', 0x45c6, 0xfd, &(0x7f0000002a40)=""/253, 0x41000, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000015100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000015140)={0x0, 0x0, 0xfffffff8, 0x1f}, 0x10}, 0x78) 21:21:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000100)=@abs={0x1}, 0x6e, 0x0}, 0x0) 21:21:12 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000b80)={&(0x7f0000000880)=@id={0x1e, 0x3, 0x0, {0x0, 0x4}}, 0x10, 0x0}, 0x0) 21:21:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000feffffff00000000010001008b273f00ffffffff069bc01f2e9031ff018000006a4706000400000085100000020000008510000003000000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000085100000fdffffff85100000ffffffff"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x83, &(0x7f0000000100)=""/131, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:21:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/82, 0x52}], 0x1}, 0x40000022) 21:21:13 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x0, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}]}, 0x2c}}, 0x0) 21:21:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x464fd1f1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:21:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x5, 0x0, 0x4000000}]}}, &(0x7f0000000380)=""/161, 0x26, 0xa1, 0x1}, 0x20) 21:21:13 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) 21:21:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/107, 0x6b}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="b2", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="1c"], 0x48}, 0x0) 21:21:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}]}, 0x2c}}, 0x0) 21:21:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') 21:21:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}, 0x0) 21:21:15 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x0, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}]}, 0x2c}}, 0x0) 21:21:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f0000000380)=""/161, 0x26, 0xa1, 0x1}, 0x20) 21:21:15 executing program 2: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x101310a07faeb976}, 0x10) 21:21:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}, 0x300) 21:21:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x8, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:21:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000700)="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", 0xec1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}, 0x0) 21:21:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:15 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004300)={0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000004180)=""/72, 0x48}], 0x1}, 0x0) 21:21:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x8, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:21:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100008500000000000000000500000000e7"], &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x20000413, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:16 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x0, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}, 0x0) 21:21:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000002600)={&(0x7f00000022c0), 0x6e, 0x0, 0x0, &(0x7f0000002180)=ANY=[], 0xf8}, 0x0) 21:21:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000380)=""/161, 0x26, 0xa1, 0x1}, 0x20) 21:21:16 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000004300)={0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000004180)=""/72, 0x48}], 0x1}, 0x0) 21:21:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000003b80)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000002700)=""/244, 0xf4}], 0x1}, 0x0) recvmsg$unix(r1, &(0x7f00000043c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) 21:21:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:16 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0x1e88, @private1={0xfc, 0x1, '\x00', 0x1}, 0x9}}, 0x80, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/100, 0x64}, 0x2) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x16, 0x1, 0x14001, 0x0, 0x0, 0xffffffffffffffff, 0x2000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x40010101) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)=""/93, 0x5d}, 0x12160) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004240)={0x11, 0x6, &(0x7f00000018c0)=ANY=[@ANYBLOB="95000020eb0040010029260c5526bb4734ad48b0a737990e22dbffa0a8d741bb1a4e8e897dbc2dcc1928964430be7902c5ba9c58ed1b34f2fc9422488506c650f1463784f805995c76c9f0efb3d6f89062c3ac79ada4c91b3f8db5e81cb2af971f6803c244986492d8cd75e81fb80ef192a8", @ANYRES32=r0], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x6, 0xfffffffd, 0xfffffffc}, 0x10}, 0x78) r1 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0), 0x1c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000017c0)=@bpf_ext={0x1c, 0x2, &(0x7f0000001a00)=ANY=[@ANYRESHEX], &(0x7f0000000640)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000680)=""/4096, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001740)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001780)={0x3, 0xa, 0x2, 0x7520001e}, 0x10, 0x8724}, 0x78) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r3, &(0x7f0000000c40)={&(0x7f0000000bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x2) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x38, 0x4c000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x8, 0x0, 0xd895, 0x3, 0xc80, 0xffffffffffffffff, 0x4, '\x00', r4, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x40) sendmsg$kcm(r1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300), 0x6e, &(0x7f0000000000)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x2, &(0x7f0000000400)}, 0x40012002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000015180)={0x0, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x60}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xd3, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f0000000140)='GPL\x00', 0x45c6, 0xfd, &(0x7f0000002a40)=""/253, 0x41000, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000015100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000015140)={0x3, 0x0, 0xfffffff8, 0x1f}, 0x10}, 0x78) 21:21:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x2f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) close(r0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 21:21:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:18 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x0, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) 21:21:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={0x0, &(0x7f0000000380)=""/161, 0x0, 0xa1, 0x8}, 0x20) 21:21:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)='%', 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}, 0x0) 21:21:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x16, 0xfffffffc, 0x0, 0x5}, 0x40) [ 3139.235315][ T921] BPF:hdr_len not found 21:21:18 executing program 3: socketpair(0x2, 0xa, 0x0, &(0x7f0000002a00)) [ 3139.255906][ T921] BPF:hdr_len not found 21:21:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x401) 21:21:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000380)=""/161, 0x34, 0xa1, 0x1}, 0x20) 21:21:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x63, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:19 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x0, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, 0x0, 0xc70}, 0x40) 21:21:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)='^', 0xfffffdef}], 0x1, &(0x7f00000027c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 21:21:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/161, 0x1a, 0xa1, 0x1}, 0x20) 21:21:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000004200)={0x0, 0x0, &(0x7f0000004040)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0xe8}, 0x0) 21:21:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001980), 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="b2", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="1c"], 0x48}, 0x0) 21:21:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}]}}, &(0x7f0000000380)=""/161, 0x32, 0xa1, 0x1}, 0x20) 21:21:20 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="f9", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000004300)={&(0x7f0000004100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000042c0)=[{&(0x7f0000004180)=""/72, 0x48}], 0x1}, 0x0) 21:21:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:20 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@mask_cswp={0x58, 0x114, 0x2, {{}, 0x0, 0x0}}], 0x58}, 0x0) 21:21:21 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x0, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_DELOBJ={0x1c, 0x14, 0xa, 0xc103e2a959e7a8b, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}]}], {0x14}}, 0x44}}, 0x0) 21:21:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @local}, @rand_addr=' \x01\x00', @private0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20280}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtaction={0x44, 0x31, 0x103, 0x0, 0x0, {}, [{0x30, 0x1, [@m_bpf={0x2c, 0x1, 0x0, 0x0, {{0x3}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80090404}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_getnetconf={0x24, 0x52, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xf528}, @NETCONFA_IFINDEX={0x8, 0x1, r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newqdisc={0x34, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x3}}]}, 0x34}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local, 0x5d, r2}) r5 = accept4$vsock_stream(r1, &(0x7f0000000240)={0x28, 0x0, 0x2710, @my=0x1}, 0x10, 0x0) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000340)=@get={0x1, &(0x7f0000000280)=""/127, 0x8}) 21:21:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000180)="13", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000280), 0x4) 21:21:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_DELSET={0x11c, 0xb, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_SET_USERDATA={0x105, 0xd, 0x1, 0x0, "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"}]}], {0x14}}, 0x144}}, 0x0) 21:21:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x28}}, 0x0) 21:21:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={{0x3c}, [@NFT_MSG_NEWFLOWTABLE={0x14}], {0x14}}, 0x3c}}, 0x0) [ 3142.068350][ T1002] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3142.086963][ T1002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:21:21 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x40045108, &(0x7f0000000200)) [ 3142.164483][ T1003] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:21:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4068aea3, &(0x7f00000000c0)) 21:21:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:21 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='lp\x00', 0x3) write(r0, &(0x7f0000000000)="05", 0x7e53d) 21:21:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001200)='smaps\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) 21:21:22 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x0, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:22 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc00c9207, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0], 0x1}) 21:21:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:22 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x3c1, 0x3, 0x364, 0x0, 0xc8, 0x0, 0x1c8, 0x5803, 0x29c, 0x2e8, 0x2e8, 0x29c, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'bridge0\x00', 'geneve1\x00'}, 0x0, 0x188, 0x1c8, 0x0, {0x0, 0x2000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e67262c1fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x1}}, @common=@inet=@socket1={{0x24}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x6}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @loopback, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa4, 0xd4}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffff}}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3c0) 21:21:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x14, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000000c0)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000080)={0x0}) 21:21:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ffff}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) 21:21:23 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r1 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000540), 0x202, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f0000002980)=[{&(0x7f0000001540)='d', 0x1}], 0x1) 21:21:23 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc00c9207, &(0x7f0000000080)={0x0}) 21:21:23 executing program 1: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000180)=@delqdisc={0x74, 0x25, 0x0, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x0, 0x7}, {0x2, 0x1}}, [@qdisc_kind_options=@q_blackhole={0xe}, @TCA_EGRESS_BLOCK={0x8}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x3}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x80, 0x0, 0x7fff, 0x0, 0x1000, 0x0, 0x2}}, {0x8, 0x2, [0x0, 0x1]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1000}]}, 0x74}, 0x1, 0x0, 0x0, 0x20040854}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@newlink={0xa4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x74, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x64, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x68}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x6, 0x1b}}, @IFLA_VLAN_INGRESS_QOS={0x4c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfffffffe, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x401, 0x96}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x80}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xa4}}, 0x20000810) 21:21:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3144.343275][ T1059] nvme_fabrics: unknown parameter or missing value 'd' in ctrl creation request 21:21:23 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r1 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000540), 0x202, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f0000002980)=[{&(0x7f0000001540)='d', 0x1}], 0x1) [ 3144.898337][ T1071] nvme_fabrics: unknown parameter or missing value 'd' in ctrl creation request 21:21:24 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x0, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:24 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240), 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) io_setup(0x1, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000001c0)="bb", 0x1}]) 21:21:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_AGEING_TIME={0x8, 0x15}]}}}]}, 0x3c}}, 0x0) 21:21:24 executing program 1: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000180)=@delqdisc={0x74, 0x25, 0x0, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x0, 0x7}, {0x2, 0x1}}, [@qdisc_kind_options=@q_blackhole={0xe}, @TCA_EGRESS_BLOCK={0x8}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x3}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x80, 0x0, 0x7fff, 0x0, 0x1000, 0x0, 0x2}}, {0x8, 0x2, [0x0, 0x1]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1000}]}, 0x74}, 0x1, 0x0, 0x0, 0x20040854}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@newlink={0xa4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x74, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x64, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x68}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x6, 0x1b}}, @IFLA_VLAN_INGRESS_QOS={0x4c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfffffffe, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x401, 0x96}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x80}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xa4}}, 0x20000810) 21:21:24 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:25 executing program 2: ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 21:21:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000089a173d2000000", @ANYBLOB], 0x48}}, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) 21:21:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) [ 3146.077017][ T1105] bridge0: port 3(bond0) entered blocking state [ 3146.083969][ T1105] bridge0: port 3(bond0) entered disabled state [ 3146.095237][ T1105] device bond0 entered promiscuous mode [ 3146.100900][ T1105] device bond_slave_0 entered promiscuous mode [ 3146.108269][ T1105] device bond_slave_1 entered promiscuous mode [ 3146.117054][ T1105] bridge0: port 3(bond0) entered blocking state [ 3146.123867][ T1105] bridge0: port 3(bond0) entered forwarding state 21:21:25 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000880)=ANY=[@ANYBLOB="12010000000000105804195000000000000109022400010000000009040000010300000009210000000122dc0109058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, &(0x7f0000000140)={0x0, 0xf, 0x77, {0x5, 0xf, 0x77, 0x2, [@ssp_cap={0xc}, @generic={0x66, 0x10, 0x0, "d4d836f44e818ce955de706fed17d40e9242d3590feeed1507094a475e27a1dab5c8f710dc13b30fe1583f58a8ce7c0cb75aa6199164edafcb94b77fa3fecbb37d31aefafc185e13c7d0f3723152f96d6bd5ed4759a9c03bc56fc70d667be056a5d1e5"}]}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, &(0x7f0000000340)={0x18, &(0x7f0000000040)=ANY=[@ANYBLOB="0000b803"], 0x0, 0x0, 0x0, 0x0}, 0x0) 21:21:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3146.961868][ T5615] usb 3-1: new high-speed USB device number 23 using dummy_hcd [ 3147.213846][ T5615] usb 3-1: Using ep0 maxpacket: 16 21:21:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}], @NL80211_ATTR_MESH_ID={0xa}]}, 0x38}}, 0x0) 21:21:26 executing program 3: r0 = openat$audio1(0xffffff9c, &(0x7f0000000380), 0x22a02, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f00000003c0)=0x2) 21:21:26 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:26 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x0, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3147.333236][ T5615] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3147.344671][ T5615] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3147.355371][ T5615] usb 3-1: New USB device found, idVendor=0458, idProduct=5019, bcdDevice= 0.00 [ 3147.365543][ T5615] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 21:21:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3147.557956][ T5615] usb 3-1: config 0 descriptor?? 21:21:26 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:26 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3148.005097][ T1142] syz-executor.3: vmalloc error: size 4096, page order 0, failed to allocate pages, mode:0xcc2(GFP_KERNEL|__GFP_HIGHMEM), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 3148.024466][ T1142] CPU: 1 PID: 1142 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0 [ 3148.032019][ T1142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3148.032019][ T1142] Call Trace: [ 3148.032019][ T1142] [ 3148.032019][ T1142] dump_stack_lvl+0x1ff/0x28e [ 3148.032019][ T1142] dump_stack+0x25/0x28 [ 3148.032019][ T1142] warn_alloc+0x4cd/0x680 [ 3148.061574][ T1142] ? kmsan_get_metadata+0xa4/0x120 [ 3148.061574][ T1142] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3148.061574][ T1142] __vmalloc_node_range+0x12bc/0x17f0 [ 3148.061574][ T1142] __vmalloc+0xf8/0x110 [ 3148.061574][ T1142] ? snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3148.061574][ T1142] ? snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3148.061574][ T1142] snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3148.061574][ T1142] ? snd_dma_iram_mmap+0x220/0x220 [ 3148.061574][ T1142] snd_dma_alloc_dir_pages+0x2da/0x530 [ 3148.061574][ T1142] snd_pcm_lib_malloc_pages+0x7b5/0xe00 [ 3148.061574][ T1142] snd_pcm_hw_params+0xfdb/0x2880 [ 3148.061574][ T1142] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3148.061574][ T1142] snd_pcm_kernel_ioctl+0x21a/0xfe0 [ 3148.061574][ T1142] snd_pcm_oss_change_params_locked+0x5c88/0x8210 [ 3148.061574][ T1142] snd_pcm_oss_set_trigger+0x635/0x1870 [ 3148.061574][ T1142] snd_pcm_oss_ioctl+0xe6b/0x1e40 [ 3148.061574][ T1142] snd_pcm_oss_ioctl_compat+0x8e/0xa0 [ 3148.061574][ T1142] ? snd_pcm_oss_ioctl+0x1e40/0x1e40 [ 3148.061574][ T1142] __se_compat_sys_ioctl+0x876/0x1150 [ 3148.061574][ T1142] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3148.061574][ T1142] __ia32_compat_sys_ioctl+0xd9/0x110 [ 3148.061574][ T1142] __do_fast_syscall_32+0x96/0xf0 [ 3148.061574][ T1142] do_fast_syscall_32+0x34/0x70 [ 3148.061574][ T1142] do_SYSENTER_32+0x1b/0x20 [ 3148.061574][ T1142] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3148.061574][ T1142] RIP: 0023:0xf6f2f549 [ 3148.061574][ T1142] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 3148.061574][ T1142] RSP: 002b:00000000f5f295fc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 3148.061574][ T1142] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000040045010 [ 3148.061574][ T1142] RDX: 00000000200003c0 RSI: 0000000000000000 RDI: 0000000000000000 [ 3148.061574][ T1142] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3148.061574][ T1142] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3148.061574][ T1142] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3148.061574][ T1142] [ 3148.279407][ T1142] Mem-Info: [ 3148.282693][ T1142] active_anon:5411 inactive_anon:152140 isolated_anon:0 [ 3148.282693][ T1142] active_file:16674 inactive_file:68133 isolated_file:0 [ 3148.282693][ T1142] unevictable:768 dirty:164 writeback:0 [ 3148.282693][ T1142] slab_reclaimable:9567 slab_unreclaimable:57092 [ 3148.282693][ T1142] mapped:22507 shmem:19024 pagetables:3901 bounce:0 [ 3148.282693][ T1142] kernel_misc_reclaimable:0 [ 3148.282693][ T1142] free:175964 free_pcp:23813 free_cma:0 [ 3148.286085][ T5615] hid (null): invalid report_size 269222400 [ 3148.325057][ T1142] Node 0 active_anon:8784kB inactive_anon:570336kB active_file:23452kB inactive_file:220844kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:75656kB dirty:596kB writeback:0kB shmem:30364kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 376832kB writeback_tmp:0kB kernel_stack:6448kB pagetables:11940kB all_unreclaimable? no [ 3148.331366][ T5615] hid (null): unknown global tag 0xd [ 3148.362731][ T1142] Node 1 active_anon:12860kB inactive_anon:38224kB active_file:43244kB inactive_file:51688kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:14372kB dirty:60kB writeback:0kB shmem:45732kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:1088kB pagetables:3664kB all_unreclaimable? no [ 3148.368121][ T5615] hid (null): unknown global tag 0xd [ 3148.399119][ T1142] Node 0 DMA free:4096kB boost:0kB min:156kB low:192kB high:228kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:4096kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3148.404685][ T5615] hid (null): global environment stack underflow [ 3148.431569][ T1142] lowmem_reserve[]: 0 905 [ 3148.438123][ T5615] hid (null): unknown global tag 0xdc [ 3148.438154][ T1142] 1218 1218 1218 21:21:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3148.451958][ T1142] Node 0 DMA32 free:38376kB boost:0kB min:36008kB low:45008kB high:54008kB reserved_highatomic:0KB active_anon:4352kB inactive_anon:512908kB active_file:1204kB inactive_file:176328kB unevictable:0kB writepending:428kB present:3129332kB managed:932648kB mlocked:0kB bounce:0kB free_pcp:45272kB local_pcp:23060kB free_cma:0kB [ 3148.482866][ T1142] lowmem_reserve[]: 0 0 313 313 313 [ 3148.488374][ T1142] Node 0 Normal free:15512kB boost:0kB min:12452kB low:15564kB high:18676kB reserved_highatomic:0KB active_anon:4432kB inactive_anon:57428kB active_file:22248kB inactive_file:44516kB unevictable:1536kB writepending:168kB present:1048576kB managed:320516kB mlocked:0kB bounce:0kB free_pcp:13468kB local_pcp:6640kB free_cma:0kB [ 3148.519329][ T1142] lowmem_reserve[]: 0 0 0 0 0 [ 3148.524430][ T1142] Node 1 Normal free:645872kB boost:0kB min:41488kB low:51860kB high:62232kB reserved_highatomic:0KB active_anon:12860kB inactive_anon:38224kB active_file:43244kB inactive_file:51688kB unevictable:1536kB writepending:60kB present:4194304kB managed:1067980kB mlocked:0kB bounce:0kB free_pcp:36124kB local_pcp:11544kB free_cma:0kB [ 3148.555629][ T1142] lowmem_reserve[]: 0 0 0 0 0 [ 3148.560621][ T1142] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB (M) = 4096kB [ 3148.573389][ T1142] Node 0 DMA32: 796*4kB (UME) 225*8kB (UME) 135*16kB (UME) 192*32kB (UME) 78*64kB (UM) 21*128kB (UM) 6*256kB (UM) 15*512kB (U) 2*1024kB (UM) 1*2048kB (M) 1*4096kB (M) = 38376kB [ 3148.592525][ T1142] Node 0 Normal: 126*4kB (ME) 122*8kB (UE) 77*16kB (UME) 40*32kB (UME) 26*64kB (UE) 9*128kB (UE) 20*256kB (UE) 7*512kB (UE) 0*1024kB 0*2048kB 0*4096kB = 15512kB [ 3148.609893][ T1142] Node 1 Normal: 750*4kB (UME) 525*8kB (ME) 149*16kB (ME) 16*32kB (UME) 10*64kB (UME) 2*128kB (M) 4*256kB (ME) 4*512kB (UM) 1*1024kB (U) 2*2048kB (UE) 153*4096kB (UM) = 645872kB [ 3148.628831][ T1142] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3148.638641][ T1142] Node 0 hugepages_total=2 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3148.648246][ T1142] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3148.658051][ T1142] Node 1 hugepages_total=5 hugepages_free=0 hugepages_surp=3 hugepages_size=2048kB [ 3148.667717][ T1142] 60862 total pagecache pages [ 3148.672608][ T1142] 0 pages in swap cache [ 3148.676850][ T1142] Swap cache stats: add 0, delete 0, find 0/0 [ 3148.683151][ T1142] Free swap = 0kB [ 3148.686948][ T1142] Total swap = 0kB [ 3148.690758][ T1142] 2097051 pages RAM [ 3148.694772][ T1142] 0 pages HighMem/MovableOnly [ 3148.699525][ T1142] 1515741 pages reserved [ 3148.703990][ T1142] 0 pages cma reserved 21:21:28 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3149.052480][ T5615] input: HID 0458:5019 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0458:5019.001B/input/input18 [ 3149.136111][ T5615] input: HID 0458:5019 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0458:5019.001B/input/input19 [ 3149.333713][ T5615] kye 0003:0458:5019.001B: input,hidraw0: USB HID v0.00 Pointer [HID 0458:5019] on usb-dummy_hcd.2-1/input0 [ 3149.453993][ T5615] usb 3-1: USB disconnect, device number 23 21:21:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400000000000000, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0xfffffffe, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @rand_addr=0x64010100}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x400000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 21:21:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0xc7) sendto$inet(r0, &(0x7f0000000340)='\b', 0x1, 0x4000081, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x0, 0x0, 0xfffffffffffffd25) 21:21:29 executing program 3: r0 = openat$audio1(0xffffff9c, &(0x7f0000000380), 0x22a02, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f00000003c0)=0x2) 21:21:29 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:30 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x0, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x404, 0x268, 0x0, 0x294, 0x268, 0x294, 0x33c, 0x378, 0x378, 0x33c, 0x378, 0x3, 0x0, {[{{@ipv6={@private2, @empty, [], [], 'vlan0\x00', 'caif0\x00'}, 0x0, 0x240, 0x268, 0x52020000, {}, [@common=@inet=@hashlimit3={{0x158}, {'nr0\x00', {0x6, 0x0, 0x22, 0x0, 0x0, 0x7, 0x1}}}, @common=@unspec=@helper={{0x44}, {0x0, 'snmp_trap\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0xa4, 0xd4}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x460) 21:21:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff01c}, {0x6}]}, 0x8) 21:21:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x8) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 21:21:30 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3151.266930][ T1226] Cannot find add_set index 0 as target 21:21:30 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:30 executing program 1: r0 = syz_usb_connect(0x2, 0x24, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0xcc, 0x5c, 0x3d, 0x10, 0x9c0, 0x202, 0x4cbe, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0xa6, 0xc}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000000)={0x18, &(0x7f0000000200)={0x0, 0x0, 0x1, 'B'}, 0x0, 0x0, 0x0, 0x0}) 21:21:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x404, 0x268, 0x0, 0x294, 0x268, 0x294, 0x33c, 0x378, 0x378, 0x33c, 0x378, 0x3, 0x0, {[{{@ipv6={@private2, @empty, [], [], 'vlan0\x00', 'caif0\x00'}, 0x0, 0x240, 0x268, 0x52020000, {}, [@common=@inet=@hashlimit3={{0x158}, {'nr0\x00', {0x6, 0x0, 0x22, 0x0, 0x0, 0x7, 0x1}}}, @common=@unspec=@helper={{0x44}, {0x0, 'snmp_trap\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0xa4, 0xd4}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x460) 21:21:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) syz_open_dev$evdev(&(0x7f0000000240), 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 21:21:31 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3151.852353][ T1238] Cannot find add_set index 0 as target 21:21:31 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3151.983949][ T1242] input: syz0 as /devices/virtual/input/input20 [ 3152.082147][ T5615] usb 2-1: new full-speed USB device number 74 using dummy_hcd [ 3152.602644][ T5615] usb 2-1: New USB device found, idVendor=09c0, idProduct=0202, bcdDevice=4c.be [ 3152.612573][ T5615] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3152.620732][ T5615] usb 2-1: Product: syz [ 3152.625284][ T5615] usb 2-1: Manufacturer: syz [ 3152.630014][ T5615] usb 2-1: SerialNumber: syz [ 3152.713734][ T5615] usb 2-1: config 0 descriptor?? [ 3152.760173][ T5615] dvb-usb: found a 'Genpix 8PSK-to-USB2 Rev.2 DVB-S receiver' in warm state. 21:21:32 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x0, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:32 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x298, 0x1fc, 0x1fc, 0x298, 0x1fc, 0x3, 0x0, {[{{@uncond, 0x0, 0x120, 0x188, 0x0, {0x6000000}, [@common=@inet=@hashlimit1={{0x58}, {'bridge_slave_0\x00', {0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x3, 0xffffffff}}}, @common=@ipv6header={{0x24}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x12, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa4, 0x110}, @common=@unspec=@NFLOG={0x6c, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "3b6a1fe8f459f616fcb6877c78d5e0d768148ccc26b19e9490517bf52dfed6af4be870da6fa74e284dffa74454e796957e640c690559df27e2c8c725b9d715ac"}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3bc) 21:21:32 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:32 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4, 0x24, 0x2, 0x4}]}]}}]}}]}}, 0x0) 21:21:32 executing program 5: ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3152.962155][ T5615] gp8psk: usb in 128 operation failed. 21:21:32 executing program 5: ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3153.241917][ T5615] gp8psk: usb in 146 operation failed. [ 3153.247653][ T5615] gp8psk: failed to get FW version [ 3153.279274][ T5615] gp8psk: usb in 149 operation failed. [ 3153.285655][ T5615] gp8psk: failed to get FPGA version 21:21:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3153.347329][ T5615] gp8psk: usb in 138 operation failed. [ 3153.353241][ T5615] dvb-usb: This USB2.0 device cannot be run on a USB1.1 port. (it lacks a hardware PID filter) [ 3153.364040][ T5615] dvb-usb: Genpix 8PSK-to-USB2 Rev.2 DVB-S receiver error while loading driver (-19) [ 3153.409206][ T5615] usb 2-1: USB disconnect, device number 74 [ 3153.422152][T21145] usb 4-1: new high-speed USB device number 19 using dummy_hcd [ 3153.677803][T21145] usb 4-1: Using ep0 maxpacket: 8 [ 3154.003896][T21145] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3154.013236][T21145] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3154.021622][T21145] usb 4-1: Product: syz [ 3154.025924][T21145] usb 4-1: Manufacturer: syz [ 3154.027380][ T5615] usb 2-1: new full-speed USB device number 75 using dummy_hcd [ 3154.030654][T21145] usb 4-1: SerialNumber: syz [ 3154.114452][T21145] usb 4-1: config 0 descriptor?? [ 3154.182417][T21145] usb 4-1: bad CDC descriptors [ 3154.190536][T21145] usb 4-1: bad CDC descriptors [ 3154.381800][T21145] usb 4-1: USB disconnect, device number 19 [ 3154.585408][ T5615] usb 2-1: New USB device found, idVendor=09c0, idProduct=0202, bcdDevice=4c.be [ 3154.594756][ T5615] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3154.603158][ T5615] usb 2-1: Product: syz [ 3154.607454][ T5615] usb 2-1: Manufacturer: syz [ 3154.612400][ T5615] usb 2-1: SerialNumber: syz [ 3154.653441][ T5615] usb 2-1: config 0 descriptor?? [ 3154.699132][ T5615] dvb-usb: found a 'Genpix 8PSK-to-USB2 Rev.2 DVB-S receiver' in warm state. 21:21:34 executing program 1: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socket$kcm(0x29, 0x2, 0x0) gettid() perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = perf_event_open(&(0x7f00000015c0)={0x2, 0x80, 0xcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x565, 0x0, 0x0, 0x0, 0xa026}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open$cgroup(&(0x7f00000013c0)={0x7, 0x80, 0x15, 0x4, 0xb, 0x6a, 0x0, 0x100000000, 0x12112, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800, 0x7, 0x0, 0xca, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xcf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, r1, 0xa) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03G\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 21:21:34 executing program 2: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xffff}, {0x80000006}]}, 0x8) syz_emit_ethernet(0x1c6, &(0x7f0000000a40)=ANY=[], 0x0) 21:21:34 executing program 5: ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:34 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3154.802282][ T5615] gp8psk: usb in 128 operation failed. [ 3154.821626][ T5615] gp8psk: usb in 137 operation failed. [ 3154.827202][ T5615] dvb-usb: This USB2.0 device cannot be run on a USB1.1 port. (it lacks a hardware PID filter) [ 3154.839274][ T5615] dvb-usb: Genpix 8PSK-to-USB2 Rev.2 DVB-S receiver error while loading driver (-19) [ 3154.976441][ T5615] usb 2-1: USB disconnect, device number 75 21:21:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3155.191833][T21145] usb 4-1: new high-speed USB device number 20 using dummy_hcd 21:21:34 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:34 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3155.423247][ T1328] device wlan1 entered promiscuous mode [ 3155.438048][T21145] usb 4-1: Using ep0 maxpacket: 8 21:21:34 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3155.763434][T21145] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3155.773091][T21145] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3155.781554][T21145] usb 4-1: Product: syz [ 3155.785953][T21145] usb 4-1: Manufacturer: syz [ 3155.790693][T21145] usb 4-1: SerialNumber: syz [ 3155.802299][ T24] audit: type=1326 audit(1638912095.014:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1334 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3155.897910][T21145] usb 4-1: config 0 descriptor?? 21:21:35 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4, 0x24, 0x2, 0x4}]}]}}]}}]}}, 0x0) 21:21:35 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:35 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3155.995021][T21145] usb 4-1: can't set config #0, error -71 [ 3156.050941][T21145] usb 4-1: USB disconnect, device number 20 [ 3156.244763][ T24] audit: type=1326 audit(1638912095.494:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1346 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:21:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:35 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3156.586558][ T24] audit: type=1326 audit(1638912095.834:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1334 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:21:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3156.829847][ T1198] ieee802154 phy0 wpan0: encryption failed: -22 [ 3156.836599][ T1198] ieee802154 phy1 wpan1: encryption failed: -22 21:21:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3156.961989][T21145] usb 4-1: new high-speed USB device number 21 using dummy_hcd [ 3157.047690][ T24] audit: type=1326 audit(1638912096.294:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1346 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:21:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3157.151859][ T24] audit: type=1326 audit(1638912096.334:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1364 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3157.222355][T21145] usb 4-1: Using ep0 maxpacket: 8 [ 3157.528647][T21145] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3157.539228][T21145] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3157.547838][T21145] usb 4-1: Product: syz [ 3157.552325][T21145] usb 4-1: Manufacturer: syz [ 3157.557061][T21145] usb 4-1: SerialNumber: syz [ 3157.597730][T21145] usb 4-1: config 0 descriptor?? [ 3157.648549][T21145] usb 4-1: bad CDC descriptors [ 3157.656861][T21145] usb 4-1: bad CDC descriptors [ 3157.698742][ T24] audit: type=1326 audit(1638912096.944:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1374 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3157.869701][ T5615] usb 4-1: USB disconnect, device number 21 21:21:37 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:37 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:37 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:37 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4, 0x24, 0x2, 0x4}]}]}}]}}]}}, 0x0) 21:21:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:38 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3158.729247][ T24] audit: type=1326 audit(1638912097.974:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1392 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:21:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3158.980290][ T5615] usb 4-1: new high-speed USB device number 22 using dummy_hcd [ 3159.012852][ T24] audit: type=1326 audit(1638912098.254:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:21:38 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3159.222170][ T5615] usb 4-1: Using ep0 maxpacket: 8 21:21:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:38 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3159.513828][ T5615] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3159.523382][ T5615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3159.532127][ T5615] usb 4-1: Product: syz [ 3159.536429][ T5615] usb 4-1: Manufacturer: syz [ 3159.541157][ T5615] usb 4-1: SerialNumber: syz [ 3159.629142][ T5615] usb 4-1: config 0 descriptor?? [ 3159.742861][ T5615] usb 4-1: bad CDC descriptors [ 3159.766748][ T5615] usb 4-1: bad CDC descriptors [ 3159.850568][ T24] audit: type=1326 audit(1638912099.094:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1420 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3159.952660][ T5615] usb 4-1: USB disconnect, device number 22 21:21:39 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:39 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:39 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4, 0x24, 0x2, 0x4}]}]}}]}}]}}, 0x0) 21:21:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:21:40 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) [ 3160.875583][ T24] audit: type=1326 audit(1638912100.124:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1441 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:21:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3161.092106][T21145] usb 4-1: new high-speed USB device number 23 using dummy_hcd 21:21:40 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3161.362816][T21145] usb 4-1: Using ep0 maxpacket: 8 21:21:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3161.662858][T21145] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3161.672283][T21145] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3161.680453][T21145] usb 4-1: Product: syz [ 3161.685049][T21145] usb 4-1: Manufacturer: syz [ 3161.689780][T21145] usb 4-1: SerialNumber: syz [ 3161.832379][T21145] usb 4-1: config 0 descriptor?? [ 3161.899390][T21145] usb 4-1: bad CDC descriptors [ 3161.910535][T21145] usb 4-1: bad CDC descriptors [ 3162.133120][T21145] usb 4-1: USB disconnect, device number 23 21:21:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:21:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:41 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:41 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x400c920a, &(0x7f0000000340)={&(0x7f0000000380), 0x0, 0x33}) 21:21:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:21:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:21:41 executing program 3: 21:21:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:21:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:21:42 executing program 3: 21:21:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:44 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:21:44 executing program 3: 21:21:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:21:44 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, 0x0) 21:21:44 executing program 3: syz_usb_connect(0x0, 0x0, 0x0, 0x0) 21:21:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:21:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:21:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:21:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:21:45 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:45 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:21:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:21:45 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, 0x0) 21:21:45 executing program 3: syz_usb_connect(0x0, 0x0, 0x0, 0x0) 21:21:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:21:45 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:21:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:21:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:21:46 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:46 executing program 3: syz_usb_connect(0x0, 0x0, 0x0, 0x0) 21:21:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:21:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:21:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:46 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, 0x0) 21:21:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:21:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:21:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:21:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:21:48 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:48 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x0, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4, 0x24, 0x2, 0x4}]}]}}]}}]}}, 0x0) 21:21:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {}, {0x6}]}) 21:21:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:21:48 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={0x0, 0x0}) 21:21:48 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={0x0, 0x0}) 21:21:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) [ 3169.179420][ T24] audit: type=1326 audit(1638912108.424:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1610 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:21:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3169.426587][T22848] usb 4-1: new high-speed USB device number 24 using dummy_hcd 21:21:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:21:48 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f0000000340)={0x0, 0x0}) 21:21:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3169.631656][T22848] usb 4-1: device descriptor read/64, error 18 [ 3169.902532][T22848] usb 4-1: new high-speed USB device number 25 using dummy_hcd [ 3170.092040][T22848] usb 4-1: device descriptor read/64, error 18 [ 3170.216658][T22848] usb usb4-port1: attempt power cycle 21:21:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) [ 3170.632079][T22848] usb 4-1: new high-speed USB device number 26 using dummy_hcd [ 3170.723347][T22848] usb 4-1: Invalid ep0 maxpacket: 0 [ 3170.872577][T22848] usb 4-1: new high-speed USB device number 27 using dummy_hcd [ 3170.963096][T22848] usb 4-1: Invalid ep0 maxpacket: 0 [ 3170.968872][T22848] usb usb4-port1: unable to enumerate USB device 21:21:51 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x0, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4, 0x24, 0x2, 0x4}]}]}}]}}]}}, 0x0) 21:21:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:21:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {}, {0x6}]}) 21:21:51 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newqdisc={0x74, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x44, 0x2, {{}, [@TCA_NETEM_DELAY_DIST={0x6, 0x2, "a37a"}, @TCA_NETEM_RATE={0x14}, @TCA_NETEM_CORRUPT={0xc}]}}}]}, 0x74}}, 0x0) 21:21:51 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) [ 3172.148645][ T24] audit: type=1326 audit(1638912111.394:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1651 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:21:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {}, {0x6}]}) 21:21:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3172.682925][ T24] audit: type=1326 audit(1638912111.924:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1662 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3172.732050][ T5615] usb 4-1: new high-speed USB device number 28 using dummy_hcd 21:21:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3172.785052][ T24] audit: type=1326 audit(1638912111.964:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1663 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3172.928318][ T5615] usb 4-1: device descriptor read/64, error 18 21:21:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x14}, {}, {0x6}]}) [ 3173.207160][ T5615] usb 4-1: new high-speed USB device number 29 using dummy_hcd 21:21:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3173.403191][ T5615] usb 4-1: device descriptor read/64, error 18 [ 3173.493444][ T24] audit: type=1326 audit(1638912112.734:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1677 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3173.522632][ T5615] usb usb4-port1: attempt power cycle [ 3173.574209][ T24] audit: type=1326 audit(1638912112.824:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1663 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3173.971546][ T5615] usb 4-1: new high-speed USB device number 30 using dummy_hcd [ 3174.061964][ T5615] usb 4-1: Invalid ep0 maxpacket: 0 [ 3174.211967][ T5615] usb 4-1: new high-speed USB device number 31 using dummy_hcd [ 3174.303159][ T5615] usb 4-1: Invalid ep0 maxpacket: 0 [ 3174.308945][ T5615] usb usb4-port1: unable to enumerate USB device 21:21:54 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x0, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4, 0x24, 0x2, 0x4}]}]}}]}}]}}, 0x0) 21:21:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {}, {0x6}]}) 21:21:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:54 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 21:21:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7b40, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3175.475012][ T24] audit: type=1326 audit(1638912114.724:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1686 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:21:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3175.600712][ T24] audit: type=1326 audit(1638912114.764:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1685 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3175.624708][ T24] audit: type=1326 audit(1638912114.834:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1684 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3176.027763][ T24] audit: type=1326 audit(1638912115.274:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1698 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3176.121649][ T5615] usb 4-1: new high-speed USB device number 32 using dummy_hcd 21:21:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3176.312707][ T5615] usb 4-1: device descriptor read/64, error 18 21:21:55 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x84}, {}, {0x6}]}) 21:21:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3176.581843][ T5615] usb 4-1: new high-speed USB device number 33 using dummy_hcd [ 3176.694397][ T24] audit: type=1326 audit(1638912115.944:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1707 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3176.774548][ T24] audit: type=1326 audit(1638912116.024:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1710 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3176.797004][ T5615] usb 4-1: device descriptor read/64, error 18 21:21:56 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) [ 3176.805003][ T24] audit: type=1326 audit(1638912116.024:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1708 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3176.877446][ T24] audit: type=1326 audit(1638912116.124:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1698 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3176.914133][ T5615] usb usb4-port1: attempt power cycle 21:21:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3177.242795][ T24] audit: type=1326 audit(1638912116.484:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1716 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3177.342357][ T5615] usb 4-1: new high-speed USB device number 34 using dummy_hcd [ 3177.435514][ T5615] usb 4-1: Invalid ep0 maxpacket: 0 [ 3177.610577][ T5615] usb 4-1: new high-speed USB device number 35 using dummy_hcd [ 3177.704264][ T5615] usb 4-1: Invalid ep0 maxpacket: 0 [ 3177.716195][ T5615] usb usb4-port1: unable to enumerate USB device 21:21:58 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff}}]}}]}}, 0x0) 21:21:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:58 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:21:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3178.911875][ T24] audit: type=1326 audit(1638912118.154:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1727 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3179.426542][ T5615] usb 4-1: new high-speed USB device number 36 using dummy_hcd [ 3179.683059][ T5615] usb 4-1: Using ep0 maxpacket: 8 21:21:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:21:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:21:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:21:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3179.967955][ T5615] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3179.977307][ T5615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3179.985696][ T5615] usb 4-1: Product: syz [ 3179.989984][ T5615] usb 4-1: Manufacturer: syz [ 3179.994908][ T5615] usb 4-1: SerialNumber: syz [ 3180.079146][ T5615] usb 4-1: config 0 descriptor?? [ 3180.152850][ T5615] usb 4-1: bad CDC descriptors [ 3180.180042][ T5615] usb 4-1: bad CDC descriptors 21:21:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3180.335322][T21145] usb 4-1: USB disconnect, device number 36 21:21:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:00 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff}}]}}]}}, 0x0) 21:22:00 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3181.347276][ T24] kauditd_printk_skb: 6 callbacks suppressed [ 3181.347342][ T24] audit: type=1326 audit(1638912120.594:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1769 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 3181.502951][ T24] audit: type=1326 audit(1638912120.694:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1771 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3181.691876][ T5615] usb 4-1: new high-speed USB device number 37 using dummy_hcd 21:22:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 3181.934979][ T5615] usb 4-1: Using ep0 maxpacket: 8 21:22:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}]}) [ 3182.213444][ T5615] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3182.224558][ T5615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3182.233257][ T5615] usb 4-1: Product: syz [ 3182.237551][ T5615] usb 4-1: Manufacturer: syz [ 3182.242553][ T5615] usb 4-1: SerialNumber: syz [ 3182.403918][ T5615] usb 4-1: config 0 descriptor?? [ 3182.454919][ T5615] usb 4-1: bad CDC descriptors [ 3182.463176][ T5615] usb 4-1: bad CDC descriptors [ 3182.567729][ T24] audit: type=1326 audit(1638912121.814:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1793 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3182.657272][T21145] usb 4-1: USB disconnect, device number 37 21:22:02 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff}}]}}]}}, 0x0) 21:22:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:02 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:02 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) [ 3183.284967][ T24] audit: type=1326 audit(1638912122.534:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1811 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:02 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3183.768295][ T24] audit: type=1326 audit(1638912123.014:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1823 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 3183.811785][T21145] usb 4-1: new high-speed USB device number 38 using dummy_hcd 21:22:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}]}) [ 3184.067702][T21145] usb 4-1: Using ep0 maxpacket: 8 21:22:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1}, {}, {0x6}]}) [ 3184.373707][T21145] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3184.382776][ T24] audit: type=1326 audit(1638912123.624:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1835 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3184.405304][T21145] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3184.413621][T21145] usb 4-1: Product: syz [ 3184.417922][T21145] usb 4-1: Manufacturer: syz [ 3184.422995][T21145] usb 4-1: SerialNumber: syz [ 3184.434640][T21145] usb 4-1: config 0 descriptor?? [ 3184.487147][T21145] usb 4-1: bad CDC descriptors [ 3184.496898][T21145] usb 4-1: bad CDC descriptors [ 3184.699626][T21145] usb 4-1: USB disconnect, device number 38 21:22:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:04 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:04 executing program 3: syz_usb_connect(0x0, 0x3b, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}}]}}]}}]}}, 0x0) [ 3185.337627][ T24] audit: type=1326 audit(1638912124.584:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1855 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3185.430088][ T24] audit: type=1326 audit(1638912124.664:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1859 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3185.962023][ T5615] usb 4-1: new high-speed USB device number 39 using dummy_hcd 21:22:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1}, {}, {0x6}]}) [ 3186.201989][ T5615] usb 4-1: Using ep0 maxpacket: 8 [ 3186.483575][ T5615] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3186.493159][ T5615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3186.501895][ T5615] usb 4-1: Product: syz [ 3186.506201][ T5615] usb 4-1: Manufacturer: syz [ 3186.510921][ T5615] usb 4-1: SerialNumber: syz [ 3186.518039][ T24] audit: type=1326 audit(1638912125.734:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1878 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3186.550685][ T5615] usb 4-1: config 0 descriptor?? [ 3186.627456][ T5615] rndis_wlan: probe of 4-1:0.0 failed with error -22 [ 3186.650771][ T5615] rndis_host: probe of 4-1:0.0 failed with error -22 [ 3186.803043][T21145] usb 4-1: USB disconnect, device number 39 21:22:06 executing program 3: syz_usb_connect(0x0, 0x3b, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}}]}}]}}]}}, 0x0) 21:22:06 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x14}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3187.535556][ T24] audit: type=1326 audit(1638912126.784:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1899 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {}, {0x6}]}) [ 3187.698453][ T24] audit: type=1326 audit(1638912126.944:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1903 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3187.883040][ T24] audit: type=1326 audit(1638912127.124:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1910 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) [ 3188.033906][ T5615] usb 4-1: new high-speed USB device number 40 using dummy_hcd 21:22:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) [ 3188.294749][ T5615] usb 4-1: Using ep0 maxpacket: 8 21:22:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) [ 3188.571959][ T5615] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3188.581647][ T5615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3188.589964][ T5615] usb 4-1: Product: syz [ 3188.594578][ T5615] usb 4-1: Manufacturer: syz [ 3188.599309][ T5615] usb 4-1: SerialNumber: syz [ 3188.618508][ T5615] usb 4-1: config 0 descriptor?? [ 3188.696164][ T5615] rndis_wlan: probe of 4-1:0.0 failed with error -22 [ 3188.704351][ T5615] rndis_host: probe of 4-1:0.0 failed with error -22 [ 3188.813373][ T24] audit: type=1326 audit(1638912128.064:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1926 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3188.873818][T21145] usb 4-1: USB disconnect, device number 40 21:22:08 executing program 3: syz_usb_connect(0x0, 0x3b, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}}]}}]}}]}}, 0x0) 21:22:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x84}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {}, {0x6}]}) 21:22:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {}, {0x6}]}) 21:22:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) [ 3189.484143][ T24] audit: type=1326 audit(1638912128.734:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1940 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3189.518124][ T24] audit: type=1326 audit(1638912128.764:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1938 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3189.541739][ T24] audit: type=1326 audit(1638912128.764:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1939 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3189.952712][T21145] usb 4-1: new high-speed USB device number 41 using dummy_hcd [ 3189.971634][ T24] audit: type=1326 audit(1638912129.214:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1950 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3190.234590][T21145] usb 4-1: Using ep0 maxpacket: 8 21:22:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {}, {0x6}]}) 21:22:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4c}, {}, {0x6}]}) 21:22:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3190.544638][T21145] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3190.554114][T21145] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3190.562492][T21145] usb 4-1: Product: syz [ 3190.566802][T21145] usb 4-1: Manufacturer: syz [ 3190.571690][T21145] usb 4-1: SerialNumber: syz [ 3190.630649][T21145] usb 4-1: config 0 descriptor?? [ 3190.710920][T21145] rndis_wlan: probe of 4-1:0.0 failed with error -22 [ 3190.720661][T21145] rndis_host: probe of 4-1:0.0 failed with error -22 [ 3190.813796][ T24] audit: type=1326 audit(1638912130.064:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1966 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3190.925093][T21145] usb 4-1: USB disconnect, device number 41 21:22:10 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:10 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4}]}]}}]}}]}}, 0x0) 21:22:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2c}, {}, {0x6}]}) 21:22:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3191.942399][ T5615] usb 4-1: new high-speed USB device number 42 using dummy_hcd 21:22:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3192.012167][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 3192.012230][ T24] audit: type=1326 audit(1638912131.254:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1989 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3192.085392][ T24] audit: type=1326 audit(1638912131.314:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1990 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3192.108625][ T24] audit: type=1326 audit(1638912131.314:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1988 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3192.191659][ T5615] usb 4-1: Using ep0 maxpacket: 8 [ 3192.391028][ T24] audit: type=1326 audit(1638912131.634:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2003 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3192.492926][ T5615] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3192.502504][ T5615] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3192.510653][ T5615] usb 4-1: Product: syz [ 3192.515175][ T5615] usb 4-1: Manufacturer: syz [ 3192.520695][ T5615] usb 4-1: SerialNumber: syz [ 3192.606019][ T5615] usb 4-1: config 0 descriptor?? [ 3192.688195][ T5615] rndis_wlan: probe of 4-1:0.0 failed with error -22 [ 3192.696812][ T5615] rndis_host: probe of 4-1:0.0 failed with error -22 [ 3192.860873][ T5615] usb 4-1: USB disconnect, device number 42 21:22:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3193.311814][ T24] audit: type=1326 audit(1638912132.554:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2019 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3193.387277][ T24] audit: type=1326 audit(1638912132.634:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2020 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3193.410314][ T24] audit: type=1326 audit(1638912132.634:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2021 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:12 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4}]}]}}]}}]}}, 0x0) [ 3193.671112][ T24] audit: type=1326 audit(1638912132.914:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2030 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:13 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) [ 3194.097612][T21145] usb 4-1: new high-speed USB device number 43 using dummy_hcd 21:22:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3194.371900][T21145] usb 4-1: Using ep0 maxpacket: 8 [ 3194.421913][ T24] audit: type=1326 audit(1638912133.664:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2038 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3194.467416][ T24] audit: type=1326 audit(1638912133.714:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2039 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3194.713317][T21145] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3194.722971][T21145] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3194.731120][T21145] usb 4-1: Product: syz [ 3194.735674][T21145] usb 4-1: Manufacturer: syz [ 3194.740395][T21145] usb 4-1: SerialNumber: syz [ 3194.845103][T21145] usb 4-1: config 0 descriptor?? [ 3194.905158][T21145] rndis_wlan: probe of 4-1:0.0 failed with error -22 [ 3194.915468][T21145] rndis_host: probe of 4-1:0.0 failed with error -22 [ 3195.112747][T27357] usb 4-1: USB disconnect, device number 43 21:22:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:14 executing program 3: syz_usb_connect(0x0, 0x3f, &(0x7f0000000940)={{0x12, 0x1, 0x0, 0xd2, 0xcd, 0xb2, 0x8, 0x13b1, 0x14, 0x7506, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x2, 0xff, 0x0, [@cdc_ecm={{0x5}, {0x5}, {0xd}, [@acm={0x4}]}]}}]}}]}}, 0x0) 21:22:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:15 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) [ 3196.292208][T27357] usb 4-1: new high-speed USB device number 44 using dummy_hcd 21:22:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3196.559124][T27357] usb 4-1: Using ep0 maxpacket: 8 21:22:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:16 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3196.878374][T27357] usb 4-1: New USB device found, idVendor=13b1, idProduct=0014, bcdDevice=75.06 [ 3196.888010][T27357] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3196.896474][T27357] usb 4-1: Product: syz [ 3196.900792][T27357] usb 4-1: Manufacturer: syz [ 3196.905772][T27357] usb 4-1: SerialNumber: syz [ 3197.020493][T27357] usb 4-1: config 0 descriptor?? [ 3197.085310][T27357] rndis_wlan: probe of 4-1:0.0 failed with error -22 [ 3197.093772][T27357] rndis_host: probe of 4-1:0.0 failed with error -22 [ 3197.230515][ T24] kauditd_printk_skb: 10 callbacks suppressed [ 3197.230584][ T24] audit: type=1326 audit(1638912136.474:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2101 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3197.294910][T27357] usb 4-1: USB disconnect, device number 44 21:22:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) [ 3197.826177][ T24] audit: type=1326 audit(1638912137.074:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2111 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3197.971623][ T24] audit: type=1326 audit(1638912137.214:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2113 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3198.325652][ T24] audit: type=1326 audit(1638912137.574:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2115 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3198.472927][ T24] audit: type=1326 audit(1638912137.724:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2119 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3198.555332][ T24] audit: type=1326 audit(1638912137.804:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2125 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 [ 3198.703993][ T24] audit: type=1326 audit(1638912137.944:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2111 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3199.187683][ T24] audit: type=1326 audit(1638912138.434:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2134 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3199.236329][ T24] audit: type=1326 audit(1638912138.484:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2135 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3199.408918][ T24] audit: type=1326 audit(1638912138.654:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2125 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:18 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:19 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:21 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3202.899624][ T24] kauditd_printk_skb: 11 callbacks suppressed [ 3202.899694][ T24] audit: type=1326 audit(1638912142.144:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2204 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:22 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}]}) [ 3203.254356][ T24] audit: type=1326 audit(1638912142.504:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2210 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:23 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3204.588191][ T24] audit: type=1326 audit(1638912143.834:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2237 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 3204.729515][ T24] audit: type=1326 audit(1638912143.914:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2238 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:25 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}]}) 21:22:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3206.063398][ T24] audit: type=1326 audit(1638912145.314:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2274 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}]}) [ 3206.161713][ T24] audit: type=1326 audit(1638912145.364:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2275 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}]}) 21:22:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:26 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}, {}]}) 21:22:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {}, {0x6}]}) 21:22:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3207.476401][ T24] audit: type=1326 audit(1638912146.724:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2311 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}, {}]}) [ 3207.562196][ T24] audit: type=1326 audit(1638912146.804:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2317 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3207.603644][ T24] audit: type=1326 audit(1638912146.844:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2318 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {}, {}]}) 21:22:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {0x6}]}) 21:22:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3208.618200][ T24] audit: type=1326 audit(1638912147.864:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2335 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:28 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {}, {0x6}]}) 21:22:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {0x6}]}) [ 3209.098424][ T24] audit: type=1326 audit(1638912148.344:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2346 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x3d, 0x0, 0x1}, {0x6}]}) 21:22:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) [ 3209.168620][ T24] audit: type=1326 audit(1638912148.404:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2345 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {}, {0x6}]}) [ 3209.778273][ T24] audit: type=1326 audit(1638912149.024:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2357 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3209.836680][ T24] audit: type=1326 audit(1638912149.074:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2360 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {}, {0x6}]}) 21:22:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {}, {0x6}]}) [ 3210.228589][ T24] audit: type=1326 audit(1638912149.474:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2364 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3210.266420][ T24] audit: type=1326 audit(1638912149.514:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2365 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:30 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {}, {0x6}]}) 21:22:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) [ 3210.930728][ T24] audit: type=1326 audit(1638912150.174:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2378 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3210.954185][ T24] audit: type=1326 audit(1638912150.174:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2377 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3211.030179][ T24] audit: type=1326 audit(1638912150.274:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2376 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {}, {0x6}]}) 21:22:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {}, {0x6}]}) 21:22:31 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x54}, {}, {0x6}]}) 21:22:31 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:32 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3213.705025][ T24] kauditd_printk_skb: 12 callbacks suppressed [ 3213.705092][ T24] audit: type=1326 audit(1638912152.954:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2425 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:33 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) [ 3214.251844][ T24] audit: type=1326 audit(1638912153.494:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2417 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:33 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3214.755308][ T24] audit: type=1326 audit(1638912154.004:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2435 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3214.848329][ T24] audit: type=1326 audit(1638912154.074:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2436 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3214.871713][ T24] audit: type=1326 audit(1638912154.074:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2438 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3214.895784][ T24] audit: type=1326 audit(1638912154.084:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2437 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3214.966990][ T24] audit: type=1326 audit(1638912154.214:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2443 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:34 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:34 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3215.890681][ T24] audit: type=1326 audit(1638912155.134:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2452 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3215.979155][ T24] audit: type=1326 audit(1638912155.214:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2455 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3216.090143][ T24] audit: type=1326 audit(1638912155.264:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2458 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:35 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d}, {}, {0x6}]}) 21:22:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}]}) 21:22:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}]}) 21:22:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}]}) [ 3218.268721][ T1198] ieee802154 phy0 wpan0: encryption failed: -22 [ 3218.275378][ T1198] ieee802154 phy1 wpan1: encryption failed: -22 21:22:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d}, {}, {0x6}]}) 21:22:37 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {}]}) 21:22:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {}]}) 21:22:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:38 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {}]}) 21:22:38 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x3d}, {}, {0x6}]}) 21:22:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3219.735410][ T24] kauditd_printk_skb: 8 callbacks suppressed [ 3219.735477][ T24] audit: type=1326 audit(1638912158.984:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2517 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 [ 3219.765617][ T24] audit: type=1326 audit(1638912158.984:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2519 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:39 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {0x6}]}) 21:22:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {0x6}]}) 21:22:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}]}) [ 3220.259743][ T24] audit: type=1326 audit(1638912159.504:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2529 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {0x6}]}) 21:22:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {}, {0x6}]}) [ 3220.918857][ T24] audit: type=1326 audit(1638912160.164:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2540 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:40 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}]}) [ 3221.033633][ T24] audit: type=1326 audit(1638912160.204:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2542 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 [ 3221.276144][ T24] audit: type=1326 audit(1638912160.524:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2546 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:41 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 21:22:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1}, {}, {0x6}]}) [ 3222.055240][ T24] audit: type=1326 audit(1638912161.304:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2562 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {}, {0x6}]}) [ 3222.159933][ T24] audit: type=1326 audit(1638912161.364:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2565 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3222.236700][ T24] audit: type=1326 audit(1638912161.434:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2566 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3222.493030][ T24] audit: type=1326 audit(1638912161.734:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2571 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x54}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:42 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 21:22:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {}, {0x6}]}) 21:22:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {}, {0x6}]}) 21:22:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3224.747480][ T24] kauditd_printk_skb: 7 callbacks suppressed [ 3224.747546][ T24] audit: type=1326 audit(1638912163.994:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2612 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:44 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) [ 3224.952929][ T24] audit: type=1326 audit(1638912164.194:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2614 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {}, {0x6}]}) 21:22:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) [ 3225.501858][ T24] audit: type=1326 audit(1638912164.744:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2617 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3225.607875][ T24] audit: type=1326 audit(1638912164.854:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3225.868020][ T24] audit: type=1326 audit(1638912165.114:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2622 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3225.908070][ T24] audit: type=1326 audit(1638912165.144:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2623 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 [ 3226.140170][ T24] audit: type=1326 audit(1638912165.384:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2627 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:45 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1c}, {}, {0x6}]}) 21:22:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d, 0x0, 0x1}, {}, {0x6}]}) [ 3226.910569][ T24] audit: type=1326 audit(1638912166.154:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2635 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3227.037899][ T24] audit: type=1326 audit(1638912166.284:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2634 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3227.060920][ T24] audit: type=1326 audit(1638912166.284:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2638 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:46 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x0, 0x1}, {0x6}]}) 21:22:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d}, {}, {0x6}]}) 21:22:47 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d}, {}, {0x6}]}) 21:22:48 executing program 1: r0 = fsopen(&(0x7f0000000040)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 21:22:48 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3229.804462][ T24] kauditd_printk_skb: 12 callbacks suppressed [ 3229.804523][ T24] audit: type=1326 audit(1638912169.054:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2669 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x3d}, {}, {0x6}]}) [ 3230.485404][ T24] audit: type=1326 audit(1638912169.734:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2674 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3230.566991][ T24] audit: type=1326 audit(1638912169.784:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2675 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3230.590302][ T24] audit: type=1326 audit(1638912169.804:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2676 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 [ 3230.667042][ T24] audit: type=1326 audit(1638912169.864:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2669 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:50 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3230.743589][ T24] audit: type=1326 audit(1638912169.984:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2685 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3230.945379][ T24] audit: type=1326 audit(1638912170.194:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2687 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:22:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3231.361182][ T24] audit: type=1326 audit(1638912170.604:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2675 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:22:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d, 0x0, 0x1}, {}, {0x6}]}) [ 3231.637979][ T24] audit: type=1326 audit(1638912170.884:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2694 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3231.810374][ T24] audit: type=1326 audit(1638912171.054:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2697 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:51 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:51 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:52 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:52 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 21:22:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:22:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d, 0x0, 0x1}, {}, {0x6}]}) 21:22:53 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:53 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:53 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:54 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) 21:22:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3235.068589][ T24] kauditd_printk_skb: 13 callbacks suppressed [ 3235.068656][ T24] audit: type=1326 audit(1638912174.314:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2736 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3235.492667][ T24] audit: type=1326 audit(1638912174.734:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2742 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3235.594278][ T24] audit: type=1326 audit(1638912174.804:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2743 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:22:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:55 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}]}) [ 3236.309891][ T24] audit: type=1326 audit(1638912175.554:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2756 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3236.361111][ T24] audit: type=1326 audit(1638912175.584:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2742 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) 21:22:55 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3236.968873][ T24] audit: type=1326 audit(1638912176.214:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2765 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:56 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:22:56 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:22:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 3237.519701][ T24] audit: type=1326 audit(1638912176.764:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2778 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:57 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) 21:22:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:57 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:57 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3238.519207][ T24] audit: type=1326 audit(1638912177.764:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2791 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:22:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:57 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3238.794390][ T24] audit: type=1326 audit(1638912178.044:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2799 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:22:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:59 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 21:22:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:22:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3240.188231][ T24] audit: type=1326 audit(1638912179.434:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2823 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3240.277323][ T24] audit: type=1326 audit(1638912179.504:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2820 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:22:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:22:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:22:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {}, {0x6}]}) 21:22:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:22:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}]}) [ 3240.958433][ T24] audit: type=1326 audit(1638912180.204:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2837 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:23:00 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 21:23:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:23:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3241.685403][ T24] audit: type=1326 audit(1638912180.934:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2848 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:23:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:23:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:23:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {}, {0x6}]}) 21:23:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:23:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 3242.188246][ T24] audit: type=1326 audit(1638912181.434:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2860 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:23:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:02 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000060c0)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x8, 0x2, 0x80, 0x0, 0x40, 0x100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffff, 0x5}, 0x40000, 0x4, 0x10000, 0x7, 0x7f, 0x2, 0x7, 0x0, 0x8, 0x0, 0x40}, 0xffffffffffffffff, 0xf, r0, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x3f, 0x1, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x40008, 0x0, 0x401, 0x1, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x0, 0x7, 0x80, 0x0, 0x1, 0x1038, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x0, 0xfffffffffffff580}, 0x1d000, 0x7c3b, 0x0, 0x8, 0x2, 0x6, 0x7, 0x0, 0xfffffeff, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, r1, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 21:23:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:02 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:23:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {}, {0x6}]}) 21:23:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x24}, {}, {0x6}]}) [ 3243.308915][ T24] audit: type=1326 audit(1638912182.554:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2878 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:23:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 3243.405003][ T24] audit: type=1326 audit(1638912182.604:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2879 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 [ 3243.428711][ T24] audit: type=1326 audit(1638912182.644:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:23:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:23:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:23:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {}, {0x6}]}) [ 3244.378921][ T24] audit: type=1326 audit(1638912183.624:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2900 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:23:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {}, {0x6}]}) 21:23:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3244.865495][ T24] audit: type=1326 audit(1638912184.114:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2909 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 21:23:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}]}) 21:23:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {}, {0x6}]}) 21:23:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3245.479850][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 3245.479917][ T24] audit: type=1326 audit(1638912184.724:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2919 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 [ 3245.566963][ T24] audit: type=1326 audit(1638912184.814:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2921 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) 21:23:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {}, {0x6}]}) [ 3246.048145][ T24] audit: type=1326 audit(1638912185.294:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2926 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:23:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {}, {}]}) [ 3246.164686][ T24] audit: type=1326 audit(1638912185.344:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2925 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6e7e549 code=0x0 [ 3246.188950][ T24] audit: type=1326 audit(1638912185.414:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2928 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5c}, {}, {0x6}]}) [ 3246.403494][ T24] audit: type=1326 audit(1638912185.654:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2921 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) [ 3246.580397][ T24] audit: type=1326 audit(1638912185.824:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2939 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:06 executing program 4: mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)) [ 3247.177628][ T24] audit: type=1326 audit(1638912186.424:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2945 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3247.234062][ T24] audit: type=1326 audit(1638912186.464:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2941 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:06 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0xfc, 0x12, 0x0, 0x0, 0x0, "", [@nested={0xe0, 0x0, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @u32}, @typed={0x8, 0x41, 0x0, 0x0, @pid}, @typed={0xc1, 0x0, 0x0, 0x0, @binary="a6edf814d78f025a6bbbcef5f395411036a4afa951e9127f104bb47bc33a249662f5afaab5d085694d5975c1c9c047f4b96bd64d10d12289484c2a0fa6bd913fcd5d0fcc8f954aa0510eda9084a76a24df924ceb0d5b47be17ed0096161d40c7ee9f7b404d5f33f35797256e377448456a397babc21f36daa762c5978aac6fec0bb80ab88de511252acdfce330426baf416f7ddbf39432e4268a9d0d9cdbddef7fac4ecb4583ef87b00ea24fa747dd7fc5037d3f1baca2dbb92960d884"}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic]}, @nested={0x4, 0x6e}, @typed={0x8, 0x0, 0x0, 0x0, @u32=0xfffffff7}]}, 0xfc}, {&(0x7f0000000c80)={0x18, 0x15, 0x300, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x850}]}, 0x18}], 0x3, 0x0, 0x0, 0x44890}, 0x0) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3247.470621][ T24] audit: type=1326 audit(1638912186.714:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2950 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {}, {0x6}]}) 21:23:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:07 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0xfc, 0x12, 0x0, 0x0, 0x0, "", [@nested={0xe0, 0x0, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @u32}, @typed={0x8, 0x41, 0x0, 0x0, @pid}, @typed={0xc1, 0x0, 0x0, 0x0, @binary="a6edf814d78f025a6bbbcef5f395411036a4afa951e9127f104bb47bc33a249662f5afaab5d085694d5975c1c9c047f4b96bd64d10d12289484c2a0fa6bd913fcd5d0fcc8f954aa0510eda9084a76a24df924ceb0d5b47be17ed0096161d40c7ee9f7b404d5f33f35797256e377448456a397babc21f36daa762c5978aac6fec0bb80ab88de511252acdfce330426baf416f7ddbf39432e4268a9d0d9cdbddef7fac4ecb4583ef87b00ea24fa747dd7fc5037d3f1baca2dbb92960d884"}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic]}, @nested={0x4, 0x6e}, @typed={0x8, 0x0, 0x0, 0x0, @u32=0xfffffff7}]}, 0xfc}, {&(0x7f0000000c80)={0x18, 0x15, 0x300, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x850}]}, 0x18}], 0x3, 0x0, 0x0, 0x44890}, 0x0) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:08 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0xfc, 0x12, 0x0, 0x0, 0x0, "", [@nested={0xe0, 0x0, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @u32}, @typed={0x8, 0x41, 0x0, 0x0, @pid}, @typed={0xc1, 0x0, 0x0, 0x0, @binary="a6edf814d78f025a6bbbcef5f395411036a4afa951e9127f104bb47bc33a249662f5afaab5d085694d5975c1c9c047f4b96bd64d10d12289484c2a0fa6bd913fcd5d0fcc8f954aa0510eda9084a76a24df924ceb0d5b47be17ed0096161d40c7ee9f7b404d5f33f35797256e377448456a397babc21f36daa762c5978aac6fec0bb80ab88de511252acdfce330426baf416f7ddbf39432e4268a9d0d9cdbddef7fac4ecb4583ef87b00ea24fa747dd7fc5037d3f1baca2dbb92960d884"}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic]}, @nested={0x4, 0x6e}, @typed={0x8, 0x0, 0x0, 0x0, @u32=0xfffffff7}]}, 0xfc}, {&(0x7f0000000c80)={0x18, 0x15, 0x300, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x850}]}, 0x18}], 0x3, 0x0, 0x0, 0x44890}, 0x0) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {}, {0x6}]}) 21:23:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:08 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0xfc, 0x12, 0x0, 0x0, 0x0, "", [@nested={0xe0, 0x0, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @u32}, @typed={0x8, 0x41, 0x0, 0x0, @pid}, @typed={0xc1, 0x0, 0x0, 0x0, @binary="a6edf814d78f025a6bbbcef5f395411036a4afa951e9127f104bb47bc33a249662f5afaab5d085694d5975c1c9c047f4b96bd64d10d12289484c2a0fa6bd913fcd5d0fcc8f954aa0510eda9084a76a24df924ceb0d5b47be17ed0096161d40c7ee9f7b404d5f33f35797256e377448456a397babc21f36daa762c5978aac6fec0bb80ab88de511252acdfce330426baf416f7ddbf39432e4268a9d0d9cdbddef7fac4ecb4583ef87b00ea24fa747dd7fc5037d3f1baca2dbb92960d884"}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic]}, @nested={0x4, 0x6e}, @typed={0x8, 0x0, 0x0, 0x0, @u32=0xfffffff7}]}, 0xfc}, {&(0x7f0000000c80)={0x18, 0x15, 0x300, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x850}]}, 0x18}], 0x3, 0x0, 0x0, 0x44890}, 0x0) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:09 executing program 4: statx(0xffffffffffffffff, 0x0, 0x0, 0x3939789395ed1dce, 0x0) 21:23:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa4}, {}, {0x6}]}) 21:23:09 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x24, 0x0, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8c10) 21:23:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3250.586452][ T24] kauditd_printk_skb: 10 callbacks suppressed [ 3250.586515][ T24] audit: type=1326 audit(1638912189.834:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3022 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:09 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$usbmon(&(0x7f0000000f40), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000f80)) 21:23:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3250.822065][ T24] audit: type=1326 audit(1638912190.064:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3026 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3251.083948][ T24] audit: type=1326 audit(1638912190.314:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3030 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:10 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@private1, @in6=@ipv4={""/10, ""/2, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000640)=0xe8) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x10, 0x15, 0x1, 0x0, 0x25dfdbfc}, 0x10}, {0x0}, {0x0}, {&(0x7f0000000b00)={0x158, 0x2b, 0x300, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid=r2}]}, @typed={0x14, 0x71, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01046bd09d3ad6d8fee2badb9ce74b0309119fcc49f11b774af0e7f2b14dc81a559fc76c4caf936472f1fc47d896196a17429b939de7f7b60df6144abbde41907c8737f326da2982d7f654297c073c4a05094903fe22f3ac5dfbcb63951911e4ec594ae48343e6c9a5650cdaa9b130088e8cc4a37a0be97a9b", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0x158}, {&(0x7f0000000c80)={0x18, 0x15, 0x300, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) fork() r3 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r3, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3251.270745][ T24] audit: type=1326 audit(1638912190.514:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3028 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3251.660634][ T24] audit: type=1326 audit(1638912190.904:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3040 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1}, {}, {0x6}]}) [ 3251.839803][ T24] audit: type=1326 audit(1638912191.074:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3045 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) [ 3252.175898][ T24] audit: type=1326 audit(1638912191.424:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3055 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 21:23:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:23:11 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480), 0x202000, 0x0) [ 3252.210559][ T24] audit: type=1326 audit(1638912191.454:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3056 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000002c0)=@v1={0x0, @aes256={0x9}, 0x0, @desc1}) 21:23:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:11 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3252.883094][ T24] audit: type=1326 audit(1638912192.134:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3064 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 [ 3253.035983][ T24] audit: type=1326 audit(1638912192.284:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:12 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:23:12 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x24}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:13 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:23:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:14 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000019c0)='ns/pid\x00') 21:23:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:14 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 21:23:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:14 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000002c0)=@v1={0x2, @aes256, 0x10, @desc1}) [ 3255.726581][ T24] kauditd_printk_skb: 9 callbacks suppressed [ 3255.726645][ T24] audit: type=1326 audit(1638912194.974:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3121 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:23:15 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}}) 21:23:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:15 executing program 4: r0 = open(&(0x7f0000001200)='./file0\x00', 0x40, 0x0) read$rfkill(r0, &(0x7f0000000180), 0x8) 21:23:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3256.461435][ T24] audit: type=1326 audit(1638912195.704:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3129 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1d}, {0x15, 0x0, 0x1}, {}, {0x6}]}) [ 3256.677118][ T24] audit: type=1326 audit(1638912195.924:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3133 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:16 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x8, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 3256.792725][ T24] audit: type=1326 audit(1638912196.034:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3135 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3256.972835][ T24] audit: type=1326 audit(1638912196.214:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3138 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:16 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000bc0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}}) 21:23:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:23:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:16 executing program 4: sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000880}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe2(0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000680)={&(0x7f00000005c0), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 21:23:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:16 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$rfkill(r0, 0x0, 0x0) [ 3257.657338][ T24] audit: type=1326 audit(1638912196.904:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3150 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3257.800761][ T24] audit: type=1326 audit(1638912197.044:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3153 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:17 executing program 4: syz_mount_image$squashfs(&(0x7f00000002c0), 0x0, 0x0, 0x2, &(0x7f0000001480)=[{&(0x7f0000000340)="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", 0xffc, 0x5}, {&(0x7f0000001380)='Z', 0x1, 0xfdd8}], 0x0, &(0x7f0000001500)) [ 3257.987273][ T24] audit: type=1326 audit(1638912197.234:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3156 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3258.139639][ T24] audit: type=1326 audit(1638912197.384:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3159 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:17 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x5452, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}]}) 21:23:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:17 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x5460, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3258.869039][ T24] audit: type=1326 audit(1638912198.114:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3167 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:18 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x8008700b, 0x0) 21:23:18 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:18 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x30, &(0x7f0000000000)={@multicast1, @remote}, 0x5000) 21:23:18 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x4, &(0x7f0000000000)={@dev, @empty}, 0x10) 21:23:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}]}) 21:23:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1}, {}, {0x6}]}) 21:23:19 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc0406618, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:23:20 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x8901, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}]}) 21:23:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:20 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @remote, 0x1}, 0x10) 21:23:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa4}, {0x15, 0x0, 0x1}, {}, {0x6}]}) [ 3261.135047][ T24] kauditd_printk_skb: 7 callbacks suppressed [ 3261.135113][ T24] audit: type=1326 audit(1638912200.384:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3203 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:20 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) [ 3261.485022][ T24] audit: type=1326 audit(1638912200.734:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3208 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3261.632360][ T24] audit: type=1326 audit(1638912200.874:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3211 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6ed9549 code=0x0 [ 3261.706540][ T24] audit: type=1326 audit(1638912200.954:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3212 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc0c0583b, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x40806685, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}, {}]}) [ 3262.302770][ T24] audit: type=1326 audit(1638912201.544:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3221 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:21 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={0x0}}, 0x0) 21:23:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:21 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x10, 0x15, 0x1, 0x0, 0x25dfdbfc}, 0x10}, {0x0}, {&(0x7f0000000b00)={0x64, 0x2b, 0x300, 0x0, 0x25dfdbfb, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x0, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @generic, @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x64}, {&(0x7f0000000c80)={0x18, 0x0, 0x300, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x4, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 3262.726533][ T24] audit: type=1326 audit(1638912201.974:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3226 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 [ 3262.878316][ T24] audit: type=1326 audit(1638912202.124:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3230 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:22 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4008700c, 0x0) 21:23:22 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x4, &(0x7f0000000000)={@multicast1, @remote}, 0x20000010) 21:23:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:22 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$eventfd(r0, &(0x7f0000000500), 0xff2c) read$eventfd(r0, &(0x7f0000000100), 0x8) 21:23:22 executing program 1: open(&(0x7f0000000000)='.\x00', 0x222902, 0x0) [ 3263.530913][ T24] audit: type=1326 audit(1638912202.774:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3248 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f2f549 code=0x0 21:23:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}, {}]}) [ 3263.911160][ T24] audit: type=1326 audit(1638912203.154:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3253 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:23 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80287010, &(0x7f00000067c0)) 21:23:23 executing program 1: syz_mount_image$squashfs(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001480)=[{&(0x7f0000000340)="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", 0xffc, 0x5}, {&(0x7f0000001340)="04", 0x1}, {&(0x7f0000001380)='Z', 0x1, 0xfdd8}, {&(0x7f0000001440)='\\', 0x1}], 0x0, 0x0) [ 3264.103576][ T24] audit: type=1326 audit(1638912203.354:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3258 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f12549 code=0x0 21:23:23 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) getitimer(0x0, &(0x7f0000000140)) 21:23:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:23 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0x18, 0x12, 0x1621, 0x0, 0x0, "", [@typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0x18}, {0x0}, {&(0x7f0000000b00)={0xcc, 0x2b, 0x300, 0x0, 0x0, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0xcc}, {&(0x7f0000000c80)={0x18, 0x15, 0x0, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:23 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000300)='./file0\x00', 0x6, 0x4, &(0x7f0000001480)=[{&(0x7f0000000340)="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", 0xffe, 0x5}, {&(0x7f0000001340)="045abfb7029cfd61f03ea4d19fc65777d0a4e71f32cb7f5c197d60edc6", 0x1d, 0x80}, {&(0x7f0000001380)="5aa2ecea6dfd1d98ac833024398c8503dd9789560af8579dd3b4526d13520accfc1d315e62addba52fa4c7d3c9d6e1a5fd4aceb3c4f61874e387443c0a608b114eeb6991a1c6e3ecbd71c46f7589529c9d96a7107c7560bdf38e3ee6f3bfe7f5413185405dab5a195988d7c7febf2b30", 0x70, 0xfdd8}, {&(0x7f0000001440)="5c17bcf8", 0x4}], 0x0, 0x0) 21:23:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:24 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x7002, 0x0) 21:23:24 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x30, &(0x7f0000000000)={@multicast1, @remote}, 0x20000010) 21:23:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000200)={'wlan0\x00'}) 21:23:24 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) 21:23:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {}, {}]}) 21:23:25 executing program 1: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001480)=[{&(0x7f0000000340)="eb361f55f48895b453d482dc7fbdfa2714b71c03b0e8f4be90bc166de7468921d591134321ded4d41966da231e109635d3f2e9b7b4d44b9f48bbc37a24944a9f31641e72feae23abb1e1fe9809f38f581f1852a558f13118277c0b222291a60691c05a7cee34d4dff49e4e28c76f1dd5e0b6668c0f19ddf13e90a0f0cc5e767f04a2ae627b6990cff25607ef8bdfce3094279f31455cc712b0e5a94f58da0c0cc4c8bf7a21633a6f91cc422035be08fa60af0cab3deb851b5804f6312a14615fa29df6ab3e4d55d8eff4004483c5c9dd87b4362eb102602e2184d986bde937bb5f02be817aeff7fcb65eeded4e036e46711931f5b62e3fe8fbfde3cffe4c5a6f0a334703efc64337f78b5d57204d5dd9596976e5640125126ad2585db42cc23c7c27c8cf4d57733d76f839d0ee6660ceb5c690b001780ecab60da66f10ae517e7ba7e3dc4fedb6dd485bb1042e212fe52580733c7bea0786f69ee8cbf32cdca5c3535f455b4dbf73ed3c1db13fb8cb993c103ed8f6a30f1c543598ebad91a09c0d6d3718586e7d373d34c750f146118ff27abc52eafafaebf66a32994953455e7a95b60a70018da1ddf17f2fb4d18e72d8541ed5ff5c99af2ecff3889e2d15334fb9d91448ad0d27eb0b13dfa5d7dc5c521e5a980d526be3699e37f7ecaba057260fc2dff7362135e9bef893a0462a357ed29f64d4cc253d17d3744aa5559a3a390bfd54333f572eecf750fa751cbfbecccbb9512bdb364b0dd99b7e52a33d8653f0eda48e5b7bb5c6231fadad1fe5388e9c2b61d51b0071b8b7eb85a9160be20208ef311f35f1276ebfeb2f32da9b8828eb2da0b73d7d6de1dc5250a2c4b41a1b44d668c4119e5a5b797a6789ed53f15cdf560f2e4f0c502f04aa05f7c9daa12b505360b7ca7729822e59b6fb44c6738ef724ececa40ec6f301aeece43ce543f411edba010da5abccf5023b8cd8ac6576cd3a0ffca219b41ee914a1c15bd7203233d00c09d33c8e4e7cf8bbf8bb02f5e9b646e82d269f4bb78bfce03d1b57e1ff0181d5029d225e3a708ec3d7bbdc357ec541073cbe48d11a930d506dac52effe3d4cc0c80f3cb70a59f4aa09ad4ffae946b73a40b85ab033e3297a0fd77c615bc277f89f80b4253f0d1d1e431b81c43a891e9fa7ee8a9d3a9faadc97e4da443b4c1ea551cc17b7cfa5a43a89185d7cfc33fea6605f1dec25518fe97c8c4aa5bb6fee1c66fb7474f93f33739d009e0e8491293b69ea24082db3d72e944c29cf1825aea467a18d824868d5986b57988f68bb0055d8c5942d36299e69644dc2411b72d373d9a3825621a405dd0e14210ac3674d69a509949c4ab4c1f567697e70b8d513955dbb1507f13b9a535a8cf41430710bc6b019ef90c4e668a54c9858106221ce9e57ab5ddd807fdcee264faa4a5bbb546bd0fc8918c86d09d7171d1957ca35d0b109c96026c399c2c121fc1f2b431c134c1d61bf6a86fde292d81ee09fb4c35a00e84ddf45bb47c2ce52eb33cf80b65b844b0b641dc477050acae472a7d4fd6815d5c823745b32334a22c2195917dab1f372760a2f8a44f04a8f23529788f98731e6b78d0ae4754c05063b4a167175c119f79d46814d94be8517db86f1fe7236b797e59feb2c4c61854e7985b76c448684bf6712453a34ee7faf77399a9857ed208ac9ed02ed2159d04400d6ea2d48128bb15611643374f4a8a1c32f3d4f99cf127a4464ef15c41c4ae3bb5bdb500fe541e56a0c450c9c41911d352e206484d1c390284272bf1d9d64e9120ce707870dbb42657151df2e6bc02a0b929e5b4876557975a8550ecba996b0c4838f240445cd54237e7e0fd73b831cf91c525e13291d2059ef0ee77fb8da4eda14ca56faab8826889996d1b82700e9aacc33d0018b5d226d699e8e523bdcc5a719f16d1505a5d31e9a3e076882a1f775b11797649b7903ae2e14897eeff9f7df1e3cdd3f34c8e94067c0ee0df05cdc829ca5d9e86d619aacc3868f6ab302a198a0c17a1c12dea52182da8bd629f86929bec0048bead850d71fe2ebdf6e77970cf436cd96fe4d7fa8b613547c0bd55c8ea5925a1c64798625cb0aa366e892a940d1b4cf79d439fc9f4d91a3edf3b0960d8a7400feb34ce372ec54aee134ade8b5c496db64d9a9892556789b5d8702b2ac54285adbfae75ec5bc93f5e40c7ad54c155606a9b11c5f0d11f209cfc111002e343c65379aa2886a2b70baa92b9510110d4dc36adada360feab3f44f250473a6eb76ec2499033484651915ada64d4f94f428ee246d5c59ab86320c982a52fadefee3263ec70e6f33445dd7c92aa49d16a0f534aab0b9dbc319b5126b11c717d87fd3ff373f1c15c8862308b1db434810521c5b346cb96cfec987fd94757ee6144074bee331e8a7c995dd0cbe214bba8382d59ab57f5c4f5a06aa27db29fd9beaa37c2f54c8e4050db39a89a1811211a6a517081c365c16cda7189f62ecff6e2f31cf2705306b1e9c8a7ade0472412a1bc5f7b9878372b4f5b827889c60e324224f5deec98564737727439af42dcc02889781706c67ab3d6f29ef08e98dae3d048965f0d6bb2c60c3fd27b72619a4cc5c09844b4a79800c94af370cfb3a48ca3e3171d1942e6b027982aad192b40f17808ef3fdf9e0dc69a5d54448816ed058e2334f71657ae6d1020094fdb52fda167d6e22e86b0b1b32edb25334134c469dba68ff095dc7d012cad10034ca455fa22ba3d5ceaabf66a4af5f57dc2fb1c4ed1543221ee7918e26d59d58da39713a25ff05ae8ac388050741079c468f6018c16c9b1939362f820b7d6f902916d521ddb92680bc631cb1256dcea1a779fd5e94ad4c7eff767dd008da53368352648e980ef1aceb3ae4d68da076165007fcdb6ae8dcc983a35fd349d3d8a307f613f8f018581cf4ec16040c298a7cc0a6ca8a5aa81bf19ed5e6eed1097acd56f07c36ee0eb958dec50fb8ccae55a114aad6b0b257d10a83fe975cf3f9e95d1941a823fd8fd50dd6ab3eb79058f21d08589466bb6ba8e8cef8e03ea12539ca2954fb431d6e3839f82381d9f3e3f50a63bfc630084bb9d35a830e94865d5e6cfd5fa95d57aa072b6ae337fde0fd7ec65059cfb9068da28ff967aef4ea0ac97505827c0159e13d31468b44eb3aac08a9f0048c6b1823e32bec51d2f8394b9fdf667033fd2e6161cfc3eaef0a46253281fc3adeedfa5c8c25b7fc80327aab91d65283bc456ee7caa8b36c2fe9ced26151cbf8d14aa2d883af8f1d228ba0237e83d47253b75fecbe777f0200ae2e507eff7f30f4aee293958871bcd11c12bfc4131d42b8db3000bf240ed432fcbb7821192f43f0ea661fdde05e0f312e54572834a587ec00cc774e8a9106714b52ab2171fa7925cd464cedc3d65b0fb12eb89c8c12362496ef52ed185536a41eaeca1541b4b6023848a6d4280fb450e29df10bac307d64938c12cf041dd4031b2936956b6837a8749c891bd9c0984e3a7662a84f580468e6399480a089d9441799bf4f11f67353d5e38c31af97c17115ee3a41055f20dea2e88646cb97f86d04e6eb9fd3f2b3b7d1b897616a2d8aba02d51726674c429980189e315bd0776225e2da036d050348a95ab109e99045fa56bf6c2b3b8a3c32f64aa7860d7318222acda7c0c512348a1423fa06f8adaf850c2c9de1a7165452d168081451eb8e6ef78ae0616b8d1ba04d897d7fbe9a8ba43bd60eafa56c93d188f957cbc91a42e5bececb6d793ba26356e9a840d12ef1dabb1f2a4f28680e7115e69f69e2b0ed5f1bdbb9345d32ddc07f3e0a448bee3b24752729986c3231ecf14701feb2ed1e6c1c90f2922057072d16ea5d1c5303b431f6141293aeac115aa5037196f184fe4fdf936880b0a8ec6a2451e17d4f996a18e63dd38a7966f2b670441bc52ad2189a65f9e345a4c42650e6eea25aa14ea68cf46244589d339b100f7bbfc3cb4e65889b0054dd76c11bfb9f0dbb2e2bc27e6b4c2fab4f08f08205a18b98e35074d4313502c7151b4016a84b1a2dd3735f46105c766c8626354632b97684cac9e29dbacb315e1fdde2f4414d2ef52ecc4d6bc1e9a31cb7b3ef4a600f345425332ac975730e385f7a9e3dde74617c075be63dcd85e24d4f42eb8e59c243a71fc0d42f9f080c9d2ace595cbd54a97b27da9f820972db9fcd52a0ebb8f17ffd2e525f2138dfee4942c7af221b521025e15cc11e4cc173b82638a74308f98d38e8ad59750083a235848e28d1dea1f2f1356c4c93b07e972ff593e7cc825a763efad3853d88c7b153143f2f692bfe161844d4de23fb38560590762228b9ddf8bda7777652c1b52af7afc0d4db0fac98979884639c9ffffda8a3357b2a0134348e5cb7050796050c7fbd457b4457e82dbc477a11e6ea1f6f44cd753c1eb991d260f96b6bcd4af647163f79daed17ea50d7eff7549c9f8fe258c66b1f7b755aeb6050fe44af91a3c3a689bcb737f4bbc03d3db578252035df3974eab6d034281ce88a7a7409679a2da212617775a27cbd499fcd6f593bcba6ed454123ab2e255cbdcc13680d7994523d0b5a6d4138426effbcc9dd045c0fee9defaf5a81aa14aadceefc9ea7dd1b8de13162da0a9af1a2ce0a169e33301faef15eed9c99e7c4405bd3e659acaf8b37cc8d2870a84cc164bac9e90fa9b3b0f049bf46701c5a720015ca32f34b3f8b2be925e77d4f3fa33b1511aa2ca749d5c8bea65bd12f81131e2f891d82b37b32677e594b22e64e5315b2ddf5211eedd4d996f8233732b49b04f2e61a93ac4be302b5e8929b8c05a7332c024711f8c1ac3ba0b37314ebfc93aa13a23d5cdd37a0e4c0cf87871b1b8216198c137db0fcc04f12af7a3fbcd87f54a48eb189a95a23fdf555b4005e1c4f55ef5be9c08565de06b3c948a8aa2e18018713826a29246d2ac6cb273565f95c1b8a8a1a7f2af61cb00af0faa4ce506c969332e69353776a484e178ded38f60b91b138d53a6c2dbf69dc231cf134cddd99c18ede453e3c3cbdd8c0b74959ee903f67357268631f8b2b041e2d132999ccbe930c290a4789a2fa33106f698c6f6a97e2718c50400db3435221cd2b8549ccdc23c26a202c2aeb0b4d4cce2db0d07305539cd6b0333113625d124118a440c49210866333aae69e28edd6288d6231cbb349c7c53e8ee5a2e8922b0abb546afe65daa4789ad2aeeba4eb60874f2497942b439706dafcdc354887f64ab1894f501172d1911a14b508400c582bbe96a5053b9b1ea09773c8ca67cb6a91d3baefeeaf4e5ac7b70b7cadf4462da435c0947ef0f07e681e0ab907c5f131eba3aac0e4bc6c89ceca10cdbac33ac6a831988911aad349aa0cb38957a4bc38ce5e226112f41b2cacdfa2075a627c3e9a9293b18a27398ffe38810ae32a0219e463787f4a4e0c7b9e80e2f872c8365f8b6e4b6c08cb7a5cea2d6657783fe9e26bf113a1194786de10332e5c9a9475b4fcd8c577eb9be63a619e504cd9dc693ae968147411ced839f68360bf69dfef8583e96466a57f5cf9950de75bd7e7e8344644e7d531e07e7bbb107e1a108b0e7aa95afaf7a5137685d01fe3a877a94a4632b7d137b6c4b4601ab9562e44b4a2d31831ffdc6503ee68f2b008e88e9f3830905d7332a9f822b6b24ce357cb7f505d051ed961231bb2966cbf78b8b74da7ba418f31543f92922eda4556aa9dc79578b906bf2dd7fe497f067ec7d11ccd73b405640918ddb53885d25466d6864cf971392d7a71b6024f05ed3145800e0e2cc5e644c0acb2113bbbf9275cef35a9f62a4f495cd59b", 0xffc, 0x5}, {0x0}], 0x0, 0x0) 21:23:25 executing program 4: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001480)=[{&(0x7f0000000340)="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", 0xffc, 0x5}, {&(0x7f0000001340)="04", 0x1}], 0x0, 0x0) 21:23:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x541b, 0x20000000) 21:23:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000200)={'wlan0\x00'}) 21:23:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xa, 0x2, @remote}]}, 0x34}}, 0x0) 21:23:25 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) 21:23:25 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @remote, 0x1, 0x1, [@empty]}, 0x14) 21:23:25 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x14, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/127, 0x7f}], 0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 3266.476550][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 3266.476611][ T24] audit: type=1326 audit(1638912205.724:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3305 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:26 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0x1c, 0x12, 0x1621, 0x0, 0x0, "", [@nested={0x4, 0x6e}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0x1c}, {0x0}, {&(0x7f0000000b00)={0xcc, 0x2b, 0x300, 0x0, 0x0, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0xcc}, {&(0x7f0000000c80)={0x18, 0x15, 0x0, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:26 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x200}) 21:23:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:26 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:26 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x14, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/127, 0x7f}], 0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 21:23:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:26 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x14, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/127, 0x7f}], 0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 21:23:26 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0x1c, 0x12, 0x1621, 0x0, 0x0, "", [@nested={0x4, 0x6e}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0x1c}, {0x0}, {&(0x7f0000000b00)={0xcc, 0x2b, 0x300, 0x0, 0x0, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0xcc}, {&(0x7f0000000c80)={0x18, 0x15, 0x0, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 3267.841145][ T24] audit: type=1326 audit(1638912207.084:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3348 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x14, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/127, 0x7f}], 0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 21:23:27 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x14, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/127, 0x7f}], 0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 21:23:27 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0x1c, 0x12, 0x1621, 0x0, 0x0, "", [@nested={0x4, 0x6e}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0x1c}, {0x0}, {&(0x7f0000000b00)={0xcc, 0x2b, 0x300, 0x0, 0x0, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0xcc}, {&(0x7f0000000c80)={0x18, 0x15, 0x0, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:27 executing program 4: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), 0xffffffffffffffff) getresuid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) 21:23:27 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, 0x0) r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x15, 0x0, 0x1, 0x1}, {}, {0x6}]}) [ 3269.110279][ T24] audit: type=1326 audit(1638912208.354:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3404 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f27549 code=0x0 21:23:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:28 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x14, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/127, 0x7f}], 0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 21:23:28 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x14, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/127, 0x7f}], 0x1, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 21:23:28 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0x1c, 0x12, 0x1621, 0x0, 0x0, "", [@nested={0x4, 0x6e}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0x1c}, {0x0}, {&(0x7f0000000b00)={0xcc, 0x2b, 0x300, 0x0, 0x0, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0xcc}, {&(0x7f0000000c80)={0x18, 0x15, 0x0, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:28 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) read$rfkill(r0, &(0x7f0000000180), 0x8) 21:23:29 executing program 4: syz_mount_image$squashfs(&(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x4103, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:23:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) 21:23:29 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @remote, 0x0, 0x1, [@empty]}, 0x20000014) 21:23:29 executing program 1: r0 = socket(0xa, 0x3, 0x3) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) 21:23:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x300}) 21:23:29 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:29 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 21:23:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1, 0x1}, {0x6}]}) 21:23:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000240), 0x7, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000200)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980913, 0x0, '\x00', @ptr}}) 21:23:30 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000002c0)=@v1={0x3, @aes256, 0x0, @desc1}) 21:23:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000bc0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}}) 21:23:30 executing program 4: sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, 0x0, 0x0) 21:23:30 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x404c1, 0x0) 21:23:30 executing program 4: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) 21:23:30 executing program 5: syz_mount_image$squashfs(&(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:23:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00'}) r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:30 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x7004, 0x0) 21:23:30 executing program 3: mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)) syz_open_dev$dri(&(0x7f00000009c0), 0x0, 0x1d1040) syz_open_dev$usbmon(&(0x7f0000000f40), 0x4, 0x0) 21:23:30 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 21:23:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {}, {0x6}]}) 21:23:31 executing program 1: getitimer(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe2(0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) 21:23:31 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000280), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, 0x12, r0, 0x0) 21:23:31 executing program 2: pipe2(0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000a80)='b', 0x1, 0x5) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$usbmon(&(0x7f0000000f40), 0x4, 0x2) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) 21:23:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x18, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8"]}, 0x18}, {0x0}, {&(0x7f0000000b00)={0x58, 0x2b, 0x300, 0x0, 0x25dfdbfb, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x20, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @uid}]}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @generic]}, 0x58}, {&(0x7f0000000c80)={0x18, 0x0, 0x300, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x4, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r1 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r1, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:31 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x16, 0x0, 0x0) 21:23:31 executing program 5: syz_mount_image$squashfs(0x0, &(0x7f0000000300)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) 21:23:31 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0xf0, 0x12, 0x1621, 0x0, 0x0, "", [@nested={0xd4, 0x0, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @u32}, @typed={0x8, 0x41, 0x0, 0x0, @pid}, @typed={0xb7, 0x0, 0x0, 0x0, @binary="a6edf814d78f025a6bbbcef5f395411036a4afa951e9127f104bb47bc33a249662f5afaab5d085694d5975c1c9c047f4b96bd64d10d12289484c2a0fa6bd913fcd5d0fcc8f954aa0510eda9084a76a24df924ceb0d5b47be17ed0096161d40c7ee9f7b404d5f33f35797256e377448456a397babc21f36daa762c5978aac6fec0bb80ab88de511252acdfce330426baf416f7ddbf39432e4268a9d0d9cdbddef7fac4ecb4583ef87b00ea24fa747dd7fc5037d"}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic]}, @nested={0x4, 0x6e}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0xf0}, {0x0}, {&(0x7f0000000b00)={0xcc, 0x2b, 0x300, 0x0, 0x0, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0xcc}, {&(0x7f0000000c80)={0x18, 0x15, 0x0, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:31 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000280), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 21:23:31 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) read$rfkill(r0, 0x0, 0xf0ffffff7f0000) 21:23:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000840)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]]}, 0x1c}}, 0x0) 21:23:31 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/bcma', 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) [ 3273.321839][ T24] audit: type=1326 audit(1638912212.564:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3560 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {}, {0x6}]}) 21:23:33 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x8008700b, &(0x7f00000067c0)) 21:23:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x24, 0x3f, 0x8, 0x8, 0x0, 0x719, 0xc0200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0xffffffffffffffff, 0xa}, 0x8200, 0x0, 0x103, 0x4, 0x9c7, 0x6, 0x1, 0x0, 0xe10, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x4) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 21:23:33 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x3a, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:33 executing program 5: syz_open_dev$dri(&(0x7f00000009c0), 0x77, 0x0) 21:23:33 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, 0x0, 0x0) 21:23:33 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @remote, 0x1}, 0x10) 21:23:33 executing program 5: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, 0x0) 21:23:33 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) setuid(0xee00) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x58) 21:23:33 executing program 4: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@mpol={'mpol', 0x3d, {'default', '', @val={0x3a, [0x2c, 0x39]}}}}]}) 21:23:33 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setuid(0xee00) ioctl$sock_inet_SIOCDELRT(r0, 0x8914, &(0x7f0000000b00)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast1}}) 21:23:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000002fc0)={@multicast1, @empty, @dev}, 0xc) [ 3274.892027][ T3580] tmpfs: Bad value for 'mpol' [ 3274.904916][ T3580] tmpfs: Bad value for 'mpol' [ 3275.320718][ T24] audit: type=1326 audit(1638912214.564:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3586 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {}, {0x6}]}) 21:23:35 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x40247007, &(0x7f00000067c0)) 21:23:35 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4008700c, &(0x7f00000067c0)) 21:23:35 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) sendmsg$netlink(r1, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000640)={'nat\x00', 0x0, [0x3, 0x4a955073, 0x7d15, 0xff]}, &(0x7f00000006c0)=0x54) r2 = accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80800) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast1, @initdev}, &(0x7f00000000c0)=0xc) fsopen(&(0x7f0000000100)='fusectl\x00', 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000bc0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @broadcast}}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500), r4) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, r5, 0x0, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x225d, 0x9, 0x7, 0x2}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmsg$netlink(r4, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'ip6tnl0\x00', r3, 0x2f, 0x20, 0xff, 0x800, 0x11, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1, 0x1, 0x8000, 0x7fffffff, 0x2}}) fsopen(&(0x7f0000000600)='pstore\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x9, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, [@map_val={0x18, 0x7, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x7f}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xa4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0xc7, &(0x7f0000000200)=""/199, 0x41000, 0x2, '\x00', r6, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x7, 0x3, 0x7}, 0x10}, 0x78) 21:23:35 executing program 2: symlink(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='./file1\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) clone(0x200ab00, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:23:35 executing program 4: mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 21:23:35 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:35 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x40046629, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:35 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_devices(r0, 0x0, 0x0) 21:23:35 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000280), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) 21:23:35 executing program 5: syz_open_dev$dri(&(0x7f00000009c0), 0x77, 0x1d1040) 21:23:36 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000002c0)=@v1={0x2, @aes256, 0x0, @desc1}) [ 3277.398888][ T24] audit: type=1326 audit(1638912216.644:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3620 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 21:23:37 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 21:23:37 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') mknodat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/253, 0xfffffffffffffe04}], 0x1, &(0x7f0000000340)}, 0x40010064) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000400000063dd6ddc"], &(0x7f0000000080)=0x2c) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD(0xffffffffffffffff, 0xc01064c1, &(0x7f0000000400)={0x0, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000002200)={0x13, 0xc, &(0x7f0000002340)=ANY=[@ANYBLOB="1800000004000000000000001500000018280000", @ANYRES32=0x1, @ANYBLOB="0000000006000000950000000000000018190000", @ANYRES32=0x1, @ANYBLOB="000000000000000018130000", @ANYRES32=0x1, @ANYBLOB="0000010000800000000000019693788d97fe891481be6c7e3be4151d0ceb78715ea7a0a27ecca2362ad1753ad6ba3f778c4e059bfdbd711bed9d578a312752bfa707f0bf0c0ad8e764ba47ee4eb9", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000001140)='syzkaller\x00', 0x200, 0x1000, &(0x7f0000001180)=""/4096, 0x41000, 0x22, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x78) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, "63dd6ddc"}, &(0x7f0000000080)=0x2c) sendmsg$netlink(r1, &(0x7f0000002300)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x2000000}, 0xc, &(0x7f0000000080)=[{&(0x7f0000000380)={0x58, 0x40, 0x100, 0x70bd29, 0x25dfdbfe, "", [@generic="caf9e50801fa23ccbe4119588c7b7e35146634f9797e672315e835eb38fcbf96ffa67791c0a965d14ed4be268cb12fe161764a08eb65c547fe35e59da5385d5ecaa7ed71e8a1"]}, 0x58}], 0x1, &(0x7f0000002280)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x10}}], 0x48, 0x40004}, 0x8000) syz_open_procfs(0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='devices.list\x00', 0x275a, 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) ftruncate(r4, 0x9) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000200), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write(0xffffffffffffffff, &(0x7f0000000540)="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", 0xbe8) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10}, 0xc, 0x0}, 0x0) 21:23:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 21:23:37 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x20}}, 0x40000) 21:23:37 executing program 4: pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) 21:23:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="66558b746572000000000000000000000000000000000000140200000000000003"], 0x58) 21:23:37 executing program 5: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001480)=[{&(0x7f0000000340), 0x0, 0x5}, {&(0x7f0000001340)="04", 0x1}], 0x0, &(0x7f0000001500)={[{}, {}, {'^]+^-@'}, {'\\/$%\xa3'}]}) [ 3278.639989][ T24] audit: type=1800 audit(1638912217.884:515): pid=3637 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15057 res=0 errno=0 21:23:38 executing program 5: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, 0x0, 0x8c10) 21:23:38 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0xc0189436, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800}) 21:23:38 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @remote, 0x0, 0xffffff1f, [@empty]}, 0x14) [ 3279.709403][ T1198] ieee802154 phy0 wpan0: encryption failed: -22 [ 3279.716061][ T1198] ieee802154 phy1 wpan1: encryption failed: -22 [ 3279.862272][ T24] audit: type=1326 audit(1638912219.104:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3659 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:39 executing program 1: pipe2(&(0x7f0000000340), 0x80000) 21:23:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, {}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}}) 21:23:39 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:23:39 executing program 5: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001480)=[{&(0x7f0000000340)="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", 0xffc, 0x5}, {&(0x7f0000001380)='Z', 0x1, 0xfdd8}], 0x0, 0x0) 21:23:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000001480)={0xfc, 0x12, 0x1621, 0x0, 0x0, "", [@nested={0xe0, 0x0, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @u32}, @typed={0x8, 0x41, 0x0, 0x0, @pid}, @typed={0xc1, 0x0, 0x0, 0x0, @binary="a6edf814d78f025a6bbbcef5f395411036a4afa951e9127f104bb47bc33a249662f5afaab5d085694d5975c1c9c047f4b96bd64d10d12289484c2a0fa6bd913fcd5d0fcc8f954aa0510eda9084a76a24df924ceb0d5b47be17ed0096161d40c7ee9f7b404d5f33f35797256e377448456a397babc21f36daa762c5978aac6fec0bb80ab88de511252acdfce330426baf416f7ddbf39432e4268a9d0d9cdbddef7fac4ecb4583ef87b00ea24fa747dd7fc5037d3f1baca2dbb92960d884"}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic]}, @nested={0x4, 0x6e}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0xfc}, {0x0}, {&(0x7f0000000b00)={0x4c, 0x2b, 0x300, 0x0, 0x0, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x20, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @generic, @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0x4c}, {&(0x7f0000000c80)={0x18, 0x15, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:40 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x5, &(0x7f0000000000)={@multicast1, @remote}, 0x10) 21:23:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) setuid(0xee00) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000b00)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast1}}) 21:23:40 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59"]}, 0x1c}, {0x0}, {&(0x7f0000000b00)={0x154, 0x2b, 0x300, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @typed={0x14, 0x71, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01046bd09d3ad6d8fee2badb9ce74b0309119fcc49f11b774af0e7f2b14dc81a559fc76c4caf936472f1fc47d896196a17429b939de7f7b60df6144abbde41907c8737f326da2982d7f654297c073c4a05094903fe22f3ac5dfbcb63951911e4ec594ae48343e6c9a5650cdaa9b130088e8cc4a3", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0x154}, {&(0x7f0000000c80)={0x18, 0x15, 0x300, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x850}]}, 0x18}], 0x4, 0x0, 0x0, 0x44890}, 0x0) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:40 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4028700f, &(0x7f00000067c0)) 21:23:40 executing program 2: setgroups(0x4, &(0x7f0000000400)=[0x0, 0xee01, 0x0, 0xee01]) 21:23:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x10, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic]}, 0x10}, {&(0x7f0000001480)={0x3c, 0x12, 0x1621, 0x0, 0x0, "", [@nested={0x20, 0x0, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @u32}, @typed={0x8, 0x41, 0x0, 0x0, @pid}, @typed={0x4, 0x0, 0x0, 0x0, @binary}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic]}, @nested={0x4, 0x6e}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0x3c}, {0x0}, {&(0x7f0000000b00)={0xe4, 0x2b, 0x300, 0x0, 0x0, "", [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x24, 0x0, 0x0, 0x1, [@typed={0x11, 0x65, 0x0, 0x0, @str='!/{/$[\'({-\xd7@\x00'}, @typed={0x4, 0x5c}, @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, @typed={0x14, 0x71, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @generic="89799b5bc1d019634ad7ebad84534cdd050f1dd32e86af14ada9d850e2d9cbd14a836d8a53ad549f9bb30996d8ae0e7568e59641826c850ecf86e1a8d01fe8ba700722ea512d102551431ee3bb81f743546e47c408e618b0565adb01a1fdca5a12d7d0b4c2d185f78b345216c0955bf47506ccdbb883f72a804bcc01046bd0", @typed={0x8, 0x5b, 0x0, 0x0, @fd}]}, 0xe4}, {&(0x7f0000000c80)={0x18, 0x15, 0x0, 0x0, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x5, 0x0, 0x0, 0x44890}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000050c0)) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 3282.199797][ T24] audit: type=1326 audit(1638912221.444:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3713 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:42 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc020660b, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:42 executing program 2: sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) pipe2(&(0x7f0000000340), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) 21:23:42 executing program 1: pipe2(&(0x7f0000000340), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) 21:23:42 executing program 4: mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 21:23:42 executing program 5: syz_mount_image$squashfs(&(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) socket$nl_route(0x10, 0x3, 0x0) 21:23:42 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000200)='\x00', 0xffffffffffffffff, 0x0, 0x1000) 21:23:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x200}) 21:23:42 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setuid(0xee00) ioctl$sock_inet_SIOCDELRT(r0, 0x8953, 0x0) 21:23:42 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) write$tun(r0, 0x0, 0x0) 21:23:42 executing program 3: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001480)=[{&(0x7f0000000340)="eb", 0x1}, {&(0x7f0000001340)="04", 0x1}], 0x0, 0x0) 21:23:43 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x200}) [ 3284.482353][ T24] audit: type=1326 audit(1638912223.724:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3748 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:44 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000b00)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}}) 21:23:44 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000880}, 0x40) getitimer(0x0, &(0x7f0000000140)) getitimer(0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x4, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x20000840) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480), 0x202000, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x24, 0x0, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8c10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000006c0)={0x1}, 0x8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$batadv(0x0, r1) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd0}, 0x20000040) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, 0x0, 0x20000000) 21:23:44 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc0506617, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:44 executing program 3: syz_mount_image$squashfs(&(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) 21:23:44 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x14, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:44 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) sendmsg$netlink(r0, 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) sendmsg$netlink(r1, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@dev, @dev, 0x0}, &(0x7f0000000140)=0xc) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000180)=r2) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)=0x9) r3 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r3, 0x890b, &(0x7f0000000bc0)={0x0, {0x2, 0x0, @rand_addr=0x64010102}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x800}) 21:23:45 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:45 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000280), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xe, 0x12, r0, 0x0) 21:23:45 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc0506617, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000640)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000000)={0x20, 0x15, 0x1, 0x0, 0x25dfdbfc, "", [@generic="045d7a339c25a8388a59f1280b"]}, 0x20}, {&(0x7f0000001480)={0xf4, 0x12, 0x1621, 0x0, 0x0, "", [@nested={0xd8, 0x0, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @u32}, @typed={0xc1, 0x0, 0x0, 0x0, @binary="a6edf814d78f025a6bbbcef5f395411036a4afa951e9127f104bb47bc33a249662f5afaab5d085694d5975c1c9c047f4b96bd64d10d12289484c2a0fa6bd913fcd5d0fcc8f954aa0510eda9084a76a24df924ceb0d5b47be17ed0096161d40c7ee9f7b404d5f33f35797256e377448456a397babc21f36daa762c5978aac6fec0bb80ab88de511252acdfce330426baf416f7ddbf39432e4268a9d0d9cdbddef7fac4ecb4583ef87b00ea24fa747dd7fc5037d3f1baca2dbb92960d884"}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic]}, @nested={0x4, 0x6e}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0xfffffff7}]}, 0xf4}, {0x0}, {&(0x7f0000000c80)={0x18, 0x15, 0x300, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x850}]}, 0x18}], 0x4, 0x0, 0x0, 0x44890}, 0x0) fork() r2 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r2, 0x89a1, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:45 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x10, &(0x7f0000000000)={@multicast1, @remote}, 0x700) [ 3286.867872][ T24] audit: type=1326 audit(1638912226.113:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3794 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x81, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 21:23:46 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc0506617, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8932, &(0x7f0000000200)={'wlan0\x00'}) 21:23:46 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x200}) 21:23:46 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000280), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x12, r0, 0x0) 21:23:47 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc080661a, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:47 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247008, &(0x7f00000067c0)) 21:23:47 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc0506617, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:47 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000067c0)={0x0, 0xb00, 0x0, 0x4, 0x0, 0x800}) 21:23:47 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x801c581f, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 3289.054794][ T24] audit: type=1326 audit(1638912228.303:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3822 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x0, 0x1}, {}, {0x6}]}) 21:23:49 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x10, &(0x7f0000000000)={@multicast1, @remote}, 0x20000010) 21:23:49 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc0189436, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:49 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000067c0)={0x0, 0xb00, 0x0, 0x4, 0x0, 0x800}) 21:23:49 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000280), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0xffffffff00000000) 21:23:49 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000840), 0x24000, 0x0) 21:23:49 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) 21:23:49 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x30, &(0x7f0000000000)={@multicast1, @remote}, 0x700) 21:23:49 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000067c0)={0x0, 0xb00, 0x0, 0x4, 0x0, 0x800}) 21:23:49 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0xc0185879, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:49 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480), 0x202000, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) 21:23:49 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000067c0)={0x0, 0xb00, 0x0, 0x4, 0x0, 0x800}) [ 3291.137014][ T24] audit: type=1326 audit(1638912230.383:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3848 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1}, {}, {0x6}]}) 21:23:51 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @remote, 0x0, 0xbb, [@empty]}, 0x14) 21:23:51 executing program 1: syz_mount_image$squashfs(&(0x7f00000002c0), 0x0, 0x0, 0x2, &(0x7f0000001480)=[{&(0x7f0000000340)="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", 0xffd, 0x5}, {&(0x7f0000001340)}], 0x0, &(0x7f0000001500)={[{}, {'^]+^-@'}, {'\\/$%\xa3'}]}) 21:23:51 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x2f, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:51 executing program 2: socket(0x18, 0x1, 0x6) 21:23:51 executing program 5: fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6) 21:23:51 executing program 4: socket(0x1, 0x0, 0x1) 21:23:51 executing program 5: utimes(0x0, &(0x7f00000002c0)={{0x0, 0xfffffffffffffffb}}) 21:23:51 executing program 1: pipe2(0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) 21:23:51 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={0x8, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 21:23:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x80086603, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, @desc1}) 21:23:51 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000080)="eaef125c00000000", 0x8) [ 3293.161804][ T24] audit: type=1326 audit(1638912232.403:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3875 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1}, {}, {0x6}]}) 21:23:53 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 21:23:53 executing program 1: open(&(0x7f0000000200)='\x00', 0x0, 0x0) 21:23:53 executing program 2: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x7013, 0xffffffffffffffff, 0x0) 21:23:53 executing program 3: fchmodat(0xffffffffffffffff, 0x0, 0x0) 21:23:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0) symlink(&(0x7f0000000140)='./file0\x00', 0x0) 21:23:53 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) close(r0) 21:23:53 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 21:23:53 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendto(r0, &(0x7f0000000100)="c439036707d71653091b547cb2cab0bdfb7cc2f0", 0x14, 0xc, &(0x7f0000000080)=@in, 0xc) 21:23:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f00000007c0)}, 0x0) 21:23:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x2}, 0x8) 21:23:54 executing program 3: symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='./file2\x00') lstat(&(0x7f0000000240)='./file1\x00', 0x0) chown(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) [ 3295.214305][ T24] audit: type=1326 audit(1638912234.463:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3900 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {0x35, 0x0, 0x1}, {}, {0x6}]}) 21:23:55 executing program 5: writev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0, 0xc600000000000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 21:23:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) 21:23:55 executing program 1: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockname$inet(r0, 0x0, 0x0) 21:23:55 executing program 2: semctl$GETALL(0x0, 0x0, 0x6, &(0x7f0000000100)=""/167) 21:23:55 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x843, 0x0, 0x0) 21:23:55 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt(r0, 0x0, 0x0, &(0x7f0000000080), 0x0) 21:23:55 executing program 5: poll(&(0x7f0000000100)=[{}, {}, {}, {0xffffffffffffff9c}], 0x4, 0x0) 21:23:55 executing program 1: getgroups(0x1, &(0x7f0000000040)=[0x0]) 21:23:55 executing program 2: semctl$GETALL(0x0, 0x0, 0x6, &(0x7f0000000100)=""/167) 21:23:55 executing program 3: symlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file1\x00') chown(&(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0x0) 21:23:56 executing program 4: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x37c7194f24e9ba43, 0x10, 0xffffffffffffffff, 0x0) [ 3297.323807][ T24] audit: type=1326 audit(1638912236.573:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3929 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:57 executing program 2: semctl$GETALL(0x0, 0x0, 0x6, &(0x7f0000000100)=""/167) 21:23:57 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x3}, 0xc) 21:23:57 executing program 5: fchdir(0xffffffffffffff9c) poll(0x0, 0x0, 0x7f) 21:23:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x800, 0x0, 0x0) 21:23:57 executing program 4: poll(&(0x7f0000000100)=[{}, {}], 0x2, 0x0) 21:23:57 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x386a0, 0x0) 21:23:57 executing program 3: socket$unix(0x1, 0xc36a1be674a91359, 0x0) 21:23:57 executing program 5: r0 = shmget(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) 21:23:57 executing program 2: semctl$GETALL(0x0, 0x0, 0x6, &(0x7f0000000100)=""/167) 21:23:57 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:23:58 executing program 3: symlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000000)='./file0/file0\x00') [ 3299.558737][ T24] audit: type=1326 audit(1638912238.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3963 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:23:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:23:59 executing program 5: poll(&(0x7f0000000100)=[{}, {}, {}, {0xffffffffffffff9c}, {0xffffffffffffff9c}, {0xffffffffffffff9c}, {}, {}], 0x8, 0x7f) 21:23:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pwritev(r0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0) 21:23:59 executing program 2: r0 = socket(0x2, 0xc003, 0x0) close(r0) r1 = socket(0x2, 0x1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) 21:23:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000003280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)}, 0x0) 21:23:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1003, 0x0, 0x0) 21:23:59 executing program 3: getgroups(0x7, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0]) 21:23:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000014c0)=[{0x0}, {0x0}, {&(0x7f00000012c0)}], 0x46}, 0x0) 21:23:59 executing program 1: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file1\x00') lstat(&(0x7f0000000240)='./file1\x00', 0x0) 21:24:00 executing program 4: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffff9}) 21:24:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f00000000c0)) 21:24:00 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x84e8, 0x0) [ 3301.436522][ T24] audit: type=1326 audit(1638912240.683:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3988 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:24:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:24:01 executing program 3: r0 = socket$inet(0x2, 0xc003, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:24:01 executing program 1: poll(&(0x7f0000000100)=[{}, {}, {}, {0xffffffffffffff9c}, {0xffffffffffffff9c}, {0xffffffffffffff9c}, {}, {}, {}], 0x9, 0x7f) 21:24:01 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) 21:24:01 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) sendmsg$unix(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 21:24:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 21:24:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000180)="c7", 0x1}], 0x2) 21:24:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001200)="1bcd34f15663f0a9a997834f3d31b8ac05ca5978fa71e354d090eff7a5961505c47d0904d61564850fc80b94e4f2b4a8975b9e368d", 0x35}, {&(0x7f0000001640)="c42ba223aed27418c479c179e6e7899ad8f6d5e723febc49ea0507b9aa911e0cf2cf545fd646ec678b617596a453674799bef6ca4fba19c50c5b302dfd7765ec9044fefe460501dd19294b9f608132b91e332e5fd83b0a418dbde339", 0x5c}, {0x0}], 0x3}, 0x0) 21:24:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000000100)="8cfb0ee9cf4185c9b870be92edc02d5638892628f2ec1665769246ccebd8051b4dcf32aaa596233fe5531d0427ed9c1180fe43e4012cccb4b9a423e0f775bcd3e486db1147558700fada26f9e032c3bb734f596ea9", 0x55}, {&(0x7f0000000180)="0e82956b00f3ba511a814b4eaee87e0d42b004a41e63f4da255cc07cf94d999d08000d7c4548abfa56687d1646930e9627a4eb2e976a0c4c7e9b61111883b2b0dce304194f3e73e7f1", 0x49}, {&(0x7f0000000200)="e7b4b2ed8c598a35ef810fcdc998a2e91388e8c1548b724f0dd7de6b70f3db573fed4851067e16a4b8d6c9caec4afbf89708ecdb639791020bad4e2f5b2380a4b7cd47df8ac6258d623d75246155806794ce38f577ff7ac88f87205844c5812b08e20feb0e7c53ad0fec2cab03d04a4e7063fbe755d1adbed3000af50ec2107912b8b66f02ad10f5f776214295bfc9ec1387d319c5ebbb87eb6956d4", 0x9c}, {&(0x7f00000002c0)="9b2fd392bd5efbbe06d8bf545b88f6d0cf7d80ad736cf5f43950b033aecbaa08589ddf3df843b592358982c121b0240e9433fb213251a6", 0x37}], 0x4}, 0x0) 21:24:01 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$lock(r0, 0x3, 0x0) 21:24:01 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) fcntl$lock(r0, 0x7, 0x0) 21:24:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000003280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)=[{0x10}], 0x10}, 0x0) [ 3303.216297][ T24] audit: type=1326 audit(1638912242.463:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4013 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:24:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:24:03 executing program 2: keyctl$dh_compute(0x17, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000002c0)={0x0}) 21:24:03 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\x00\b', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="14"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10) 21:24:03 executing program 1: add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="85", 0x1, 0xfffffffffffffffc) 21:24:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @private2}}) 21:24:03 executing program 4: socketpair(0x0, 0x0, 0x3, 0x0) 21:24:03 executing program 2: socketpair(0x10, 0x0, 0x4, 0x0) 21:24:03 executing program 1: socketpair(0x22, 0x0, 0x1, &(0x7f0000000080)) 21:24:03 executing program 4: prctl$PR_SCHED_CORE(0x16, 0x0, 0x0, 0x0, 0x0) 21:24:03 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/uevent_helper', 0x200, 0x0) 21:24:03 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000240)) 21:24:04 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$fb(r0, 0x0, 0x0) [ 3305.465198][ T24] audit: type=1326 audit(1638912244.713:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4047 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:24:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:24:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89a1, 0x0) 21:24:05 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x17ca, 0x0, 0x0, 0x7, 0x0, "44f2ff3aff8632f7112b35fac666cdd85bb2e2"}) 21:24:05 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/power/wakeup_count', 0x2202, 0x0) 21:24:05 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_ifreq(r0, 0x8935, 0x0) 21:24:05 executing program 4: io_setup(0x80, &(0x7f0000000000)) io_setup(0xe6, &(0x7f0000000100)=0x0) io_setup(0x2, &(0x7f0000001540)) io_setup(0xb520, &(0x7f0000001580)) io_destroy(r0) 21:24:05 executing program 5: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x127242, 0x0) 21:24:05 executing program 2: prctl$PR_SCHED_CORE(0x19, 0x0, 0x0, 0x0, 0x0) 21:24:05 executing program 3: prctl$PR_SCHED_CORE(0x1e, 0x0, 0x0, 0x0, 0x0) 21:24:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000040)) 21:24:06 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000300)='u\x00', 0x2) 21:24:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 3307.380475][ T4062] warn_alloc: 1 callbacks suppressed [ 3307.380547][ T4062] syz-executor.5: vmalloc error: size 200704, page order 0, failed to allocate pages, mode:0xcc2(GFP_KERNEL|__GFP_HIGHMEM), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 3307.403910][ T4062] CPU: 0 PID: 4062 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 3307.412756][ T4062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3307.413661][ T4062] Call Trace: [ 3307.413661][ T4062] [ 3307.413661][ T4062] dump_stack_lvl+0x1ff/0x28e [ 3307.432005][ T4062] dump_stack+0x25/0x28 [ 3307.432005][ T4062] warn_alloc+0x4cd/0x680 [ 3307.432005][ T4062] ? kmsan_get_metadata+0xa4/0x120 [ 3307.432005][ T4062] __vmalloc_node_range+0x12bc/0x17f0 [ 3307.432005][ T4062] __vmalloc+0xf8/0x110 [ 3307.432005][ T4062] ? snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3307.432005][ T4062] ? snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3307.432005][ T4062] snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3307.432005][ T4062] ? snd_dma_iram_mmap+0x220/0x220 [ 3307.432005][ T4062] snd_dma_alloc_dir_pages+0x2da/0x530 [ 3307.432005][ T4062] snd_pcm_lib_malloc_pages+0x7b5/0xe00 [ 3307.432005][ T4062] snd_pcm_hw_params+0xfdb/0x2880 [ 3307.432005][ T4062] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3307.432005][ T4062] snd_pcm_kernel_ioctl+0x21a/0xfe0 [ 3307.432005][ T4062] snd_pcm_oss_change_params_locked+0x5c88/0x8210 [ 3307.432005][ T4062] snd_pcm_oss_sync+0xa20/0x1bd0 [ 3307.432005][ T4062] snd_pcm_oss_release+0x219/0x4d0 [ 3307.432005][ T4062] ? snd_pcm_oss_open+0x2e50/0x2e50 [ 3307.432005][ T4062] __fput+0x7c4/0x10a0 [ 3307.432005][ T4062] ____fput+0x37/0x40 [ 3307.432005][ T4062] ? fput_many+0x370/0x370 [ 3307.432005][ T4062] task_work_run+0x173/0x2b0 [ 3307.432005][ T4062] exit_to_user_mode_loop+0x3f0/0x490 [ 3307.432005][ T4062] syscall_exit_to_user_mode+0x7e/0xc0 [ 3307.432005][ T4062] __do_fast_syscall_32+0xa5/0xf0 [ 3307.432005][ T4062] do_fast_syscall_32+0x34/0x70 [ 3307.432005][ T4062] do_SYSENTER_32+0x1b/0x20 [ 3307.432005][ T4062] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3307.432005][ T4062] RIP: 0023:0xf6f27549 [ 3307.432005][ T4062] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 3307.432005][ T4062] RSP: 002b:00000000f5f215fc EFLAGS: 00000296 ORIG_RAX: 0000000000000127 [ 3307.432005][ T4062] RAX: ffffffffffffffea RBX: 00000000ffffff9c RCX: 0000000020000000 [ 3307.432005][ T4062] RDX: 0000000000127242 RSI: 0000000000000000 RDI: 0000000000000000 [ 3307.432005][ T4062] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3307.432005][ T4062] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3307.432005][ T4062] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3307.432005][ T4062] [ 3307.661716][ T4062] Mem-Info: [ 3307.664921][ T4062] active_anon:5411 inactive_anon:153305 isolated_anon:0 [ 3307.664921][ T4062] active_file:16697 inactive_file:68202 isolated_file:0 [ 3307.664921][ T4062] unevictable:768 dirty:114 writeback:0 [ 3307.664921][ T4062] slab_reclaimable:9632 slab_unreclaimable:57005 [ 3307.664921][ T4062] mapped:22681 shmem:19026 pagetables:4274 bounce:0 [ 3307.664921][ T4062] kernel_misc_reclaimable:0 [ 3307.664921][ T4062] free:175171 free_pcp:22605 free_cma:0 [ 3307.708039][ T4062] Node 0 active_anon:8784kB inactive_anon:570328kB active_file:23452kB inactive_file:220844kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:75656kB dirty:416kB writeback:0kB shmem:30364kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 376832kB writeback_tmp:0kB kernel_stack:6432kB pagetables:11940kB all_unreclaimable? no [ 3307.740239][ T4062] Node 1 active_anon:12860kB inactive_anon:42892kB active_file:43336kB inactive_file:51964kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:15068kB dirty:40kB writeback:0kB shmem:45740kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB kernel_stack:1472kB pagetables:5156kB all_unreclaimable? no [ 3307.772218][ T4062] Node 0 DMA free:4096kB boost:0kB min:156kB low:192kB high:228kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:4096kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3307.799792][ T4062] lowmem_reserve[]: 0 905 1218 1218 1218 [ 3307.805886][ T4062] Node 0 DMA32 free:39136kB boost:0kB min:36008kB low:45008kB high:54008kB reserved_highatomic:0KB active_anon:4352kB inactive_anon:512904kB active_file:1204kB inactive_file:176328kB unevictable:0kB writepending:292kB present:3129332kB managed:932648kB mlocked:0kB bounce:0kB free_pcp:45284kB local_pcp:21324kB free_cma:0kB [ 3307.836930][ T4062] lowmem_reserve[]: 0 0 313 313 313 [ 3307.842652][ T4062] Node 0 Normal free:15512kB boost:0kB min:12452kB low:15564kB high:18676kB reserved_highatomic:0KB active_anon:4432kB inactive_anon:57424kB active_file:22248kB inactive_file:44516kB unevictable:1536kB writepending:124kB present:1048576kB managed:320516kB mlocked:0kB bounce:0kB free_pcp:14116kB local_pcp:6924kB free_cma:0kB [ 3307.873694][ T4062] lowmem_reserve[]: 0 0 0 0 0 [ 3307.878686][ T4062] Node 1 Normal free:641940kB boost:0kB min:41488kB low:51860kB high:62232kB reserved_highatomic:0KB active_anon:12860kB inactive_anon:42892kB active_file:43336kB inactive_file:51964kB unevictable:1536kB writepending:40kB present:4194304kB managed:1067980kB mlocked:0kB bounce:0kB free_pcp:30864kB local_pcp:21040kB free_cma:0kB [ 3307.910222][ T4062] lowmem_reserve[]: 0 0 0 0 0 [ 3307.915436][ T4062] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB (M) = 4096kB [ 3307.928215][ T4062] Node 0 DMA32: 796*4kB (UME) 226*8kB (UME) 134*16kB (UME) 216*32kB (UME) 82*64kB (UM) 19*128kB (UM) 6*256kB (U) 15*512kB (U) 2*1024kB (UM) 1*2048kB (M) 1*4096kB (M) = 39136kB [ 3307.947157][ T4062] Node 0 Normal: 126*4kB (ME) 122*8kB (UE) 77*16kB (UME) 40*32kB (UME) 26*64kB (UE) 9*128kB (UE) 20*256kB (UE) 7*512kB (UE) 0*1024kB 0*2048kB 0*4096kB = 15512kB [ 3307.964542][ T4062] Node 1 Normal: 887*4kB (UME) 509*8kB (M) 151*16kB (ME) 19*32kB (UME) 6*64kB (ME) 3*128kB (UM) 3*256kB (M) 4*512kB (UM) 1*1024kB (U) 2*2048kB (ME) 152*4096kB (UM) = 641940kB [ 3307.983285][ T4062] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3307.993328][ T4062] Node 0 hugepages_total=2 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3308.003035][ T4062] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3308.013000][ T4062] Node 1 hugepages_total=5 hugepages_free=0 hugepages_surp=3 hugepages_size=2048kB [ 3308.022704][ T4062] 60962 total pagecache pages [ 3308.027468][ T4062] 0 pages in swap cache [ 3308.031986][ T4062] Swap cache stats: add 0, delete 0, find 0/0 [ 3308.038158][ T4062] Free swap = 0kB [ 3308.042232][ T4062] Total swap = 0kB [ 3308.046043][ T4062] 2097051 pages RAM [ 3308.049933][ T4062] 0 pages HighMem/MovableOnly [ 3308.054953][ T4062] 1515741 pages reserved [ 3308.059275][ T4062] 0 pages cma reserved [ 3308.285984][ T24] audit: type=1326 audit(1638912247.533:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4073 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:24:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x35, 0x0, 0x1, 0x1}, {}, {0x6}]}) 21:24:08 executing program 1: openat$nvram(0xffffffffffffff9c, 0xffffffffffffffff, 0x940, 0x0) 21:24:08 executing program 2: io_setup(0x80, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x2, 0x2, &(0x7f0000000040)=[{}, {}], 0x0, 0x0) io_destroy(r0) 21:24:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8982, 0x0) 21:24:08 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000240)={0x0, 0x20, 0xffff, 0x0, 0x800, 0x6}) 21:24:08 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) 21:24:08 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x5452, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:24:08 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 21:24:08 executing program 2: prctl$PR_SCHED_CORE(0x34, 0x0, 0x0, 0x0, 0x0) 21:24:08 executing program 1: pipe(0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:24:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 21:24:09 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 3310.227630][ T24] audit: type=1326 audit(1638912249.473:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4100 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf6f3c549 code=0x0 21:24:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:10 executing program 2: r0 = getpgid(0x0) syz_open_procfs$namespace(r0, 0x0) 21:24:10 executing program 1: clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) select(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x4e5}, 0x0, &(0x7f0000000380)={0x0, r0/1000+60000}) 21:24:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8936, 0x0) 21:24:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:10 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f00000001c0)=0x1) 21:24:10 executing program 3: recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x80) 21:24:10 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x101001) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080), 0x2) 21:24:10 executing program 5: prctl$PR_SCHED_CORE(0x1b, 0x0, 0x0, 0x0, 0x0) 21:24:10 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000100)={@remote, @random="727678f455af", @val={@void, {0x8100, 0x0, 0x1}}, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty}, {0x0, 0x0, 0x0, @multicast2}}}}}, 0x0) 21:24:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x0, 0xfa, 0x0, 0x0, 0x0, @loopback, @dev, 0x80, 0x0, 0x6, 0x2}}) [ 3311.741600][ T4116] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 21:24:11 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, 0x0) 21:24:11 executing program 3: recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x80) 21:24:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}, 0x1, 0x0, 0x60}, 0x0) 21:24:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2}}) 21:24:11 executing program 4: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 21:24:12 executing program 0: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8942, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 21:24:12 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)=""/3, 0x3}], 0x3, 0x0, 0xe0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x33, &(0x7f0000000300)="17ffea5a3421c76ee54e3d2401f5180000ed2a0000000000000000005f54aa2e37c438c62f4b9c008000000000000037ba83c8"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:24:12 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x460f, 0x0) 21:24:12 executing program 5: ioctl$FBIO_WAITFORVSYNC(0xffffffffffffffff, 0x40044620, 0x0) io_setup(0xe6, 0x0) io_setup(0xb520, &(0x7f0000001580)) 21:24:12 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x460f, 0x0) 21:24:12 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:12 executing program 2: prctl$PR_SCHED_CORE(0x1d, 0x0, 0x0, 0x0, 0x0) 21:24:12 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0), 0x82080, 0x0) 21:24:12 executing program 2: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$fb(r0, &(0x7f00000001c0)=""/64, 0x40) 21:24:12 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:13 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4606, 0x0) 21:24:13 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x460f, 0x0) 21:24:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001e40)={0x0, 0x0, &(0x7f0000001e00)={0x0}}, 0x0) 21:24:15 executing program 1: prctl$PR_SCHED_CORE(0xf, 0x0, 0x0, 0x0, 0x0) 21:24:15 executing program 2: prctl$PR_SCHED_CORE(0x36, 0x0, 0x0, 0x0, 0x0) 21:24:15 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:15 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x460f, 0x0) 21:24:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, 0x2, 0x6, 0x3}, 0x14}}, 0x0) dup2(r0, r1) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) 21:24:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 21:24:15 executing program 3: ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:15 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x101001) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) 21:24:15 executing program 4: ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x460f, 0x0) 21:24:15 executing program 2: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x780, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6e3}) 21:24:15 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000240)={0x0, 0x0, 0xffff, 0x0, 0x800, 0x6}) 21:24:15 executing program 3: ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:15 executing program 4: ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x460f, 0x0) 21:24:16 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x8983, 0x0) 21:24:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01000000428aa87e1d9db7"], 0x14}}, 0x0) 21:24:16 executing program 1: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x3a6e0f48b0017111) 21:24:16 executing program 3: ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:16 executing program 4: ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x460f, 0x0) 21:24:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a0c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16a2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:16 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x40086602, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:24:16 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000001c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) 21:24:16 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:17 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x460f, 0x0) 21:24:17 executing program 2: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f0000000300)) 21:24:17 executing program 1: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000001bc0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/76, 0x4c}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 21:24:17 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:17 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x2, 0x101001) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) 21:24:17 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x460f, 0x0) [ 3318.629735][T27357] usb 2-1: new high-speed USB device number 76 using dummy_hcd 21:24:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000240)={0x0, 0x0, 0xffff, 0x0, 0x800}) 21:24:18 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:18 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000002c0), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000300)) 21:24:18 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x460f, 0x0) 21:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000001040), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x300000e, 0x13, r0, 0x0) 21:24:18 executing program 4: openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x460f, 0x0) 21:24:18 executing program 3: openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) [ 3319.202831][T27357] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 3319.212321][T27357] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3319.220464][T27357] usb 2-1: Product: syz [ 3319.225102][T27357] usb 2-1: Manufacturer: syz [ 3319.229867][T27357] usb 2-1: SerialNumber: syz 21:24:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) [ 3319.383749][T27357] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 3320.242596][T21145] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 3320.452863][T27357] usb 2-1: USB disconnect, device number 76 [ 3321.311742][T21145] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive [ 3321.319131][T21145] ath9k_htc: Failed to initialize the device [ 3321.329281][T27357] usb 2-1: ath9k_htc: USB layer deinitialized 21:24:20 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x189c82, 0x0) write$dsp(r0, &(0x7f00000000c0)="e4", 0x1) 21:24:20 executing program 0: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) 21:24:20 executing program 3: openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:20 executing program 4: openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x460f, 0x0) 21:24:20 executing program 2: prctl$PR_SCHED_CORE(0x3a, 0x0, 0x0, 0x0, &(0x7f0000000200)) 21:24:20 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_ifreq(r0, 0x0, 0x0) 21:24:21 executing program 3: openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:21 executing program 4: openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x460f, 0x0) 21:24:21 executing program 2: prctl$PR_SCHED_CORE(0x34, 0x0, 0x0, 0x0, &(0x7f0000000200)) 21:24:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:21 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap$dsp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 21:24:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@deltclass={0x34, 0x29, 0x201, 0x0, 0x0, {}, [@tclass_kind_options=@c_hfsc={{0x9}, {0x4}}]}, 0x34}}, 0x0) 21:24:22 executing program 1: prctl$PR_SCHED_CORE(0x4, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') 21:24:22 executing program 5: keyctl$dh_compute(0x17, &(0x7f00000001c0), 0x0, 0x0, 0x0) 21:24:22 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, 0x0) 21:24:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:22 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, 0x0) 21:24:22 executing program 0: io_uring_setup(0x7d05, &(0x7f00000002c0)={0x0, 0x0, 0x2}) 21:24:22 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, 0x0) 21:24:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5}, 0x40) 21:24:22 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ftruncate(r1, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 21:24:22 executing program 4: prctl$PR_SCHED_CORE(0x37, 0x0, 0x0, 0x0, &(0x7f0000000200)) 21:24:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:23 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, 0x0) 21:24:23 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, @private0, @remote}}) 21:24:23 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) 21:24:23 executing program 1: sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x5ea78417cbd99870) 21:24:23 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:23 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000040)=0x80000001) 21:24:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x8, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:24:24 executing program 2: syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x107002) 21:24:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5460, 0x0) 21:24:24 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:24 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x5460, 0x0) 21:24:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8901, &(0x7f0000000040)) 21:24:24 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000280)=@deltclass={0x34, 0x29, 0x201, 0x0, 0x0, {}, [@tclass_kind_options=@c_hfsc={{0x9}, {0x4}}]}, 0x34}}, 0x0) 21:24:25 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4611, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:24:25 executing program 5: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) [ 3326.217964][ T4356] syz-executor.2: vmalloc error: size 663552, page order 0, failed to allocate pages, mode:0xcc2(GFP_KERNEL|__GFP_HIGHMEM), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 3326.235531][ T4356] CPU: 1 PID: 4356 Comm: syz-executor.2 Not tainted 5.16.0-rc3-syzkaller #0 [ 3326.244380][ T4356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3326.245149][ T4356] Call Trace: [ 3326.245149][ T4356] [ 3326.245149][ T4356] dump_stack_lvl+0x1ff/0x28e [ 3326.245149][ T4356] dump_stack+0x25/0x28 [ 3326.245149][ T4356] warn_alloc+0x4cd/0x680 [ 3326.245149][ T4356] ? kmsan_get_metadata+0xa4/0x120 [ 3326.245149][ T4356] __vmalloc_node_range+0x12bc/0x17f0 [ 3326.245149][ T4356] __vmalloc+0xf8/0x110 [ 3326.245149][ T4356] ? snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3326.245149][ T4356] ? snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3326.245149][ T4356] snd_dma_vmalloc_alloc+0xbc/0xe0 [ 3326.245149][ T4356] ? snd_dma_iram_mmap+0x220/0x220 [ 3326.245149][ T4356] snd_dma_alloc_dir_pages+0x2da/0x530 [ 3326.245149][ T4356] snd_pcm_lib_malloc_pages+0x7b5/0xe00 [ 3326.245149][ T4356] snd_pcm_hw_params+0xfdb/0x2880 [ 3326.245149][ T4356] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3326.245149][ T4356] snd_pcm_kernel_ioctl+0x21a/0xfe0 [ 3326.245149][ T4356] snd_pcm_oss_change_params_locked+0x5c88/0x8210 [ 3326.245149][ T4356] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3326.245149][ T4356] snd_pcm_oss_sync+0xa20/0x1bd0 [ 3326.245149][ T4356] snd_pcm_oss_release+0x219/0x4d0 [ 3326.245149][ T4356] ? snd_pcm_oss_open+0x2e50/0x2e50 [ 3326.245149][ T4356] __fput+0x7c4/0x10a0 [ 3326.245149][ T4356] ____fput+0x37/0x40 [ 3326.245149][ T4356] ? fput_many+0x370/0x370 [ 3326.245149][ T4356] task_work_run+0x173/0x2b0 [ 3326.245149][ T4356] exit_to_user_mode_loop+0x3f0/0x490 [ 3326.245149][ T4356] syscall_exit_to_user_mode+0x7e/0xc0 [ 3326.245149][ T4356] __do_fast_syscall_32+0xa5/0xf0 [ 3326.245149][ T4356] do_fast_syscall_32+0x34/0x70 [ 3326.245149][ T4356] do_SYSENTER_32+0x1b/0x20 [ 3326.245149][ T4356] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3326.245149][ T4356] RIP: 0023:0xf6f12549 [ 3326.245149][ T4356] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 3326.245149][ T4356] RSP: 002b:00000000f5f0c1a0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127 [ 3326.245149][ T4356] RAX: ffffffffffffffea RBX: 00000000ffffff9c RCX: 00000000f5f0c1f0 [ 3326.245149][ T4356] RDX: 0000000000107002 RSI: 0000000000000000 RDI: 00000000f7048000 [ 3326.245149][ T4356] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3326.245149][ T4356] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3326.245149][ T4356] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3326.245149][ T4356] [ 3326.499504][ T4356] Mem-Info: [ 3326.503032][ T4356] active_anon:5411 inactive_anon:153319 isolated_anon:0 [ 3326.503032][ T4356] active_file:16711 inactive_file:68211 isolated_file:0 [ 3326.503032][ T4356] unevictable:768 dirty:140 writeback:0 [ 3326.503032][ T4356] slab_reclaimable:9631 slab_unreclaimable:57012 [ 3326.503032][ T4356] mapped:22692 shmem:19029 pagetables:4279 bounce:0 [ 3326.503032][ T4356] kernel_misc_reclaimable:0 [ 3326.503032][ T4356] free:172825 free_pcp:24642 free_cma:0 [ 3326.545444][ T4356] Node 0 active_anon:8784kB inactive_anon:570328kB active_file:23452kB inactive_file:220844kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:75656kB dirty:476kB writeback:0kB shmem:30364kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 376832kB writeback_tmp:0kB kernel_stack:6432kB pagetables:11940kB all_unreclaimable? no [ 3326.577643][ T4356] Node 1 active_anon:12860kB inactive_anon:42948kB active_file:43392kB inactive_file:52000kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:15112kB dirty:84kB writeback:0kB shmem:45752kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB kernel_stack:1568kB pagetables:5176kB all_unreclaimable? no [ 3326.610213][ T4356] Node 0 DMA free:4096kB boost:0kB min:156kB low:192kB high:228kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:4096kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3326.637621][ T4356] lowmem_reserve[]: 0 905 1218 1218 1218 21:24:25 executing program 4: prctl$PR_SCHED_CORE(0x39, 0x2, 0x0, 0x0, 0x0) [ 3326.643842][ T4356] Node 0 DMA32 free:39136kB boost:0kB min:36008kB low:45008kB high:54008kB reserved_highatomic:0KB active_anon:4352kB inactive_anon:512904kB active_file:1204kB inactive_file:176328kB unevictable:0kB writepending:348kB present:3129332kB managed:932648kB mlocked:0kB bounce:0kB free_pcp:45348kB local_pcp:23960kB free_cma:0kB [ 3326.674659][ T4356] lowmem_reserve[]: 0 0 313 313 313 [ 3326.680185][ T4356] Node 0 Normal free:15512kB boost:0kB min:12452kB low:15564kB high:18676kB reserved_highatomic:0KB active_anon:4432kB inactive_anon:57424kB active_file:22248kB inactive_file:44516kB unevictable:1536kB writepending:128kB present:1048576kB managed:320516kB mlocked:0kB bounce:0kB free_pcp:14116kB local_pcp:7192kB free_cma:0kB [ 3326.712160][ T4356] lowmem_reserve[]: 0 0 0 0 0 21:24:25 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) [ 3326.717151][ T4356] Node 1 Normal free:632556kB boost:0kB min:41488kB low:51860kB high:62232kB reserved_highatomic:0KB active_anon:12860kB inactive_anon:42948kB active_file:43392kB inactive_file:52000kB unevictable:1536kB writepending:84kB present:4194304kB managed:1067980kB mlocked:0kB bounce:0kB free_pcp:39332kB local_pcp:17136kB free_cma:0kB [ 3326.748508][ T4356] lowmem_reserve[]: 0 0 0 0 0 [ 3326.753678][ T4356] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB (M) = 4096kB [ 3326.766428][ T4356] Node 0 DMA32: 796*4kB (UME) 226*8kB (UME) 134*16kB (UME) 216*32kB (UME) 82*64kB (UM) 19*128kB (UM) 6*256kB (U) 15*512kB (U) 2*1024kB (UM) 1*2048kB (M) 1*4096kB (M) = 39136kB [ 3326.785296][ T4356] Node 0 Normal: 126*4kB (ME) 122*8kB (UE) 77*16kB (UME) 40*32kB (UME) 26*64kB (UE) 9*128kB (UE) 20*256kB (UE) 7*512kB (UE) 0*1024kB 0*2048kB 0*4096kB = 15512kB [ 3326.802840][ T4356] Node 1 Normal: 887*4kB (UME) 510*8kB (ME) 152*16kB (UME) 19*32kB (UME) 7*64kB (UME) 3*128kB (UM) 4*256kB (UM) 5*512kB (UME) 1*1024kB (E) 1*2048kB (M) 150*4096kB (M) = 632556kB [ 3326.821775][ T4356] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3326.831733][ T4356] Node 0 hugepages_total=2 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3326.841174][ T4356] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3326.851046][ T4356] Node 1 hugepages_total=5 hugepages_free=0 hugepages_surp=3 hugepages_size=2048kB [ 3326.860832][ T4356] 60982 total pagecache pages [ 3326.865767][ T4356] 0 pages in swap cache [ 3326.869999][ T4356] Swap cache stats: add 0, delete 0, find 0/0 [ 3326.876382][ T4356] Free swap = 0kB [ 3326.880175][ T4356] Total swap = 0kB [ 3326.884156][ T4356] 2097051 pages RAM [ 3326.888054][ T4356] 0 pages HighMem/MovableOnly [ 3326.892967][ T4356] 1515741 pages reserved [ 3326.897306][ T4356] 0 pages cma reserved 21:24:26 executing program 0: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)={0x2, 0x0, @d}, 0x18, 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 21:24:26 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername(r0, 0x0, 0x0) 21:24:26 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) mmap$fb(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 21:24:26 executing program 4: socketpair(0x2b, 0x1, 0x0, &(0x7f0000000400)) 21:24:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:27 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f00000002c0), 0x4400, 0x0) openat$dsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:24:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)=""/3, 0x3}], 0x3, 0x0, 0xe0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4d, &(0x7f0000000300)="17ffea5a3421c76ee54e3d2401f5180000ed2a0000000000000000005f54aa2e37c438c62f4b9c008000000000000037ba83c8cc405588ef0cffcf152c8851646a402ca8624a89c0e2965fc811"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:24:27 executing program 5: syz_open_dev$audion(0xffffffffffffffff, 0x0, 0x0) 21:24:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1d56, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 21:24:27 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:27 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:24:28 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 21:24:28 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:28 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x401c5820, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:24:28 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:28 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:28 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000016c0)) [ 3329.822293][ T24] audit: type=1800 audit(1638912269.063:531): pid=4413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=15593 res=0 errno=0 21:24:30 executing program 1: memfd_create(&(0x7f00000000c0)='{(!,%-^-@Y/+![[\x0e@-\x00', 0x0) 21:24:30 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], 0x0, &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:30 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:30 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d03, 0x0) 21:24:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001e40)={&(0x7f0000000000), 0xc, &(0x7f0000001e00)={0x0}}, 0x0) 21:24:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:30 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], 0x0, &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}}) 21:24:30 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:30 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000100)) 21:24:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8992, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 21:24:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8918, &(0x7f0000000040)) 21:24:31 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], 0x0, &(0x7f00000000c0), &(0x7f0000000100)}) 21:24:31 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x40049409, 0x0) 21:24:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) 21:24:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)=""/3, 0x3}], 0x3, 0x0, 0xe0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x5f, &(0x7f0000000300)="17ffea5a3421c76ee54e3d2401f5180000ed2a0000000000000000005f54aa2e37c438c62f4b9c008000000000000037ba83c8cc405588ef0cffcf152c8851646a402ca8624a89c0e2965fc811beda3ce0a6b56b6e7d8436daa15505bb4932"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:24:31 executing program 0: prctl$PR_SCHED_CORE(0x38, 0x0, 0x0, 0x0, 0x0) 21:24:31 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), 0x0, &(0x7f0000000100)}) 21:24:31 executing program 5: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:31 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 21:24:31 executing program 2: epoll_create1(0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x8}, &(0x7f0000000140), 0x0) 21:24:31 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:31 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), 0x0, &(0x7f0000000100)}) 21:24:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8940, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:32 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001480)=@bpf_lsm={0x1d, 0x5, 0x0, &(0x7f0000000e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:24:34 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$fb(r0, &(0x7f0000000080)=""/65, 0x41) 21:24:34 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), 0x0, &(0x7f0000000100)}) 21:24:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:34 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:34 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f00000002c0), 0x4400, 0x0) 21:24:34 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f00000001c0), 0x801, 0x0) 21:24:34 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:34 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0xa0}) 21:24:34 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), 0x0}) 21:24:35 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/class/sas_phy', 0x74180, 0x0) 21:24:35 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000000000)) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) mmap$fb(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x100050, r0, 0x0) 21:24:35 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:35 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), 0x0}) 21:24:35 executing program 2: socketpair(0x2c, 0x3, 0x8001, &(0x7f0000000100)) 21:24:35 executing program 1: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000001bc0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) 21:24:35 executing program 3: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0), 0x0}) 21:24:35 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000040)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) [ 3336.742080][T21145] usb 2-1: new high-speed USB device number 77 using dummy_hcd 21:24:36 executing program 0: socketpair(0x3, 0x0, 0x1633, &(0x7f0000000000)) 21:24:36 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x8}, 0x0, 0x0) 21:24:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:36 executing program 3: prctl$PR_SCHED_CORE(0x2c, 0x0, 0x0, 0x0, 0x0) 21:24:36 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 21:24:36 executing program 2: socketpair(0x11, 0x2, 0xfffffff9, &(0x7f0000000380)) 21:24:36 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 21:24:36 executing program 3: r0 = syz_open_dev$vivid(&(0x7f0000000000), 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x0, 0x3, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c4f1038"}}) [ 3337.292884][T21145] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 3337.305595][T21145] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3337.314014][T21145] usb 2-1: Product: syz [ 3337.318307][T21145] usb 2-1: Manufacturer: syz [ 3337.323194][T21145] usb 2-1: SerialNumber: syz [ 3337.416248][T21145] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested 21:24:36 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) [ 3338.122141][ T1806] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 3338.348781][T21145] usb 2-1: USB disconnect, device number 77 [ 3339.141711][ T1806] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive [ 3339.148962][ T1806] ath9k_htc: Failed to initialize the device [ 3339.157534][T21145] usb 2-1: ath9k_htc: USB layer deinitialized 21:24:38 executing program 1: syz_open_dev$dri(0xfffffffffffffffe, 0x0, 0x0) 21:24:38 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0xc0045878, 0x0) 21:24:38 executing program 3: socketpair(0x10, 0x3, 0x1ff, &(0x7f0000000c80)) 21:24:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)=""/3, 0x3}], 0x3, 0x0, 0xe0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x59, &(0x7f0000000300)="17ffea5a3421c76ee54e3d2401f5180000ed2a0000000000000000005f54aa2e37c438c62f4b9c008000000000000037ba83c8cc405588ef0cffcf152c8851646a402ca8624a89c0e2965fc811beda3ce0a6b56b6e7d8436da"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:24:38 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:38 executing program 0: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x40c2, 0x0) 21:24:39 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x5452, 0x0) 21:24:39 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001480)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000e40)=@framed, &(0x7f0000000e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:24:39 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:39 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4601, &(0x7f00000004c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 21:24:39 executing program 3: prctl$PR_SCHED_CORE(0x22, 0x0, 0x0, 0x0, 0x0) 21:24:39 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 21:24:39 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:39 executing program 3: epoll_create1(0xf2c5f5be445de03f) [ 3341.147276][ T1198] ieee802154 phy0 wpan0: encryption failed: -22 [ 3341.153871][ T1198] ieee802154 phy1 wpan1: encryption failed: -22 21:24:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000400)={'syztnl1\x00', 0x0}) 21:24:41 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={'vmac(twofish)\x00'}}) 21:24:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8918, 0x0) 21:24:41 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x460f, &(0x7f0000000000)={0x3a}) 21:24:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200), 0x4) 21:24:42 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:42 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) 21:24:42 executing program 3: io_setup(0x80, &(0x7f0000000000)) io_setup(0xffff, &(0x7f0000000180)) 21:24:42 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x206e9, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0}]) [ 3343.259634][ T4591] could not allocate digest TFM handle vmac(twofish) [ 3343.374038][ T4591] could not allocate digest TFM handle vmac(twofish) 21:24:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)=""/3, 0x3}], 0x3, 0x0, 0xe0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x5d, &(0x7f0000000300)="17ffea5a3421c76ee54e3d2401f5180000ed2a0000000000000000005f54aa2e37c438c62f4b9c008000000000000037ba83c8cc405588ef0cffcf152c8851646a402ca8624a89c0e2965fc811beda3ce0a6b56b6e7d8436daa15505bb"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:24:42 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 21:24:43 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000001600), 0x1, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000001640)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "01d6c6b8"}}) 21:24:43 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x100}) 21:24:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8901, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:43 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6d8f4dc656bf0f1a}) 21:24:43 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$fb(r0, &(0x7f0000000100)=""/199, 0xc7) 21:24:43 executing program 4: prctl$PR_SCHED_CORE(0x21, 0x0, 0x0, 0x0, 0x0) 21:24:43 executing program 2: prctl$PR_SCHED_CORE(0x3d, 0x0, 0x0, 0x0, 0x0) 21:24:43 executing program 3: socketpair(0x11, 0x2, 0x0, &(0x7f0000000380)) 21:24:43 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d8f4dc656bf0f1a}) 21:24:45 executing program 1: socket(0x29, 0x5, 0x7ff) 21:24:45 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x80086601, 0x0) 21:24:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8920, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 21:24:45 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x100}) 21:24:45 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000040)) 21:24:45 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$fb(r0, &(0x7f0000000000)=""/45, 0x2d) 21:24:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 21:24:46 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000000)={0x3a, 0x2}) 21:24:46 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0xc020660b, 0x0) 21:24:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) 21:24:46 executing program 1: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 21:24:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x40) 21:24:46 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x3f, @dev}}, 0x1e) 21:24:46 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x248380, 0x0) 21:24:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 21:24:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private1}}) 21:24:47 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r1, 0x2, &(0x7f0000000200)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x9, 0x0, r0, 0x0}]) [ 3348.466059][ T4688] ===================================================== [ 3348.473195][ T4688] BUG: KMSAN: kernel-infoleak in _copy_to_user+0x1c9/0x270 [ 3348.475964][ T4688] _copy_to_user+0x1c9/0x270 [ 3348.475964][ T4688] fb_read+0xa42/0xc80 [ 3348.475964][ T4688] vfs_read+0x6c8/0x1980 [ 3348.475964][ T4688] ksys_read+0x28c/0x520 [ 3348.475964][ T4688] __ia32_sys_read+0xdb/0x120 [ 3348.475964][ T4688] __do_fast_syscall_32+0x96/0xf0 [ 3348.475964][ T4688] do_fast_syscall_32+0x34/0x70 [ 3348.475964][ T4688] do_SYSENTER_32+0x1b/0x20 [ 3348.475964][ T4688] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3348.475964][ T4688] [ 3348.475964][ T4688] Uninit was created at: [ 3348.475964][ T4688] __kmalloc+0xc3c/0x12d0 [ 3348.475964][ T4688] fb_read+0x72a/0xc80 [ 3348.475964][ T4688] vfs_read+0x6c8/0x1980 [ 3348.475964][ T4688] ksys_read+0x28c/0x520 [ 3348.475964][ T4688] __ia32_sys_read+0xdb/0x120 [ 3348.475964][ T4688] __do_fast_syscall_32+0x96/0xf0 [ 3348.475964][ T4688] do_fast_syscall_32+0x34/0x70 [ 3348.475964][ T4688] do_SYSENTER_32+0x1b/0x20 [ 3348.475964][ T4688] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3348.475964][ T4688] [ 3348.475964][ T4688] Bytes 0-44 of 45 are uninitialized [ 3348.475964][ T4688] Memory access of size 45 starts at ffff888172b4b040 [ 3348.581658][ T4688] Data copied to user address 0000000020000000 [ 3348.581658][ T4688] [ 3348.581658][ T4688] CPU: 1 PID: 4688 Comm: syz-executor.0 Not tainted 5.16.0-rc3-syzkaller #0 [ 3348.581658][ T4688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3348.581658][ T4688] ===================================================== [ 3348.581658][ T4688] Disabling lock debugging due to kernel taint [ 3348.631813][ T4688] Kernel panic - not syncing: kmsan.panic set ... [ 3348.638264][ T4688] CPU: 1 PID: 4688 Comm: syz-executor.0 Tainted: G B 5.16.0-rc3-syzkaller #0 [ 3348.641261][ T4688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3348.641261][ T4688] Call Trace: [ 3348.641261][ T4688] [ 3348.641261][ T4688] dump_stack_lvl+0x1ff/0x28e [ 3348.641261][ T4688] dump_stack+0x25/0x28 [ 3348.641261][ T4688] panic+0x467/0xe03 [ 3348.641261][ T4688] ? add_taint+0x187/0x210 [ 3348.641261][ T4688] ? _raw_spin_unlock_irqrestore+0x78/0xb0 [ 3348.641261][ T4688] kmsan_report+0x306/0x310 [ 3348.641261][ T4688] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 3348.698491][ T4688] ? kmsan_internal_check_memory+0x49f/0x560 [ 3348.701569][ T4688] ? kmsan_copy_to_user+0xe1/0xf0 [ 3348.701569][ T4688] ? _copy_to_user+0x1c9/0x270 [ 3348.701569][ T4688] ? fb_read+0xa42/0xc80 [ 3348.701569][ T4688] ? vfs_read+0x6c8/0x1980 [ 3348.701569][ T4688] ? ksys_read+0x28c/0x520 [ 3348.701569][ T4688] ? __ia32_sys_read+0xdb/0x120 [ 3348.701569][ T4688] ? __do_fast_syscall_32+0x96/0xf0 [ 3348.738269][ T4688] ? do_fast_syscall_32+0x34/0x70 [ 3348.741926][ T4688] ? do_SYSENTER_32+0x1b/0x20 [ 3348.748211][ T4688] ? entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3348.751124][ T4688] ? ksys_read+0x28c/0x520 [ 3348.758883][ T4688] ? __ia32_sys_read+0xdb/0x120 [ 3348.760348][ T4688] ? __do_fast_syscall_32+0x96/0xf0 [ 3348.768138][ T4688] ? do_fast_syscall_32+0x34/0x70 [ 3348.771042][ T4688] ? do_SYSENTER_32+0x1b/0x20 [ 3348.778816][ T4688] ? entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3348.780255][ T4688] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 3348.790533][ T4688] ? __stack_depot_save+0x1db/0x510 [ 3348.790533][ T4688] ? kmsan_get_metadata+0xa4/0x120 [ 3348.800564][ T4688] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3348.807646][ T4688] ? should_fail+0x75/0x9c0 [ 3348.810530][ T4688] ? memcg_slab_post_alloc_hook+0x34/0xb30 [ 3348.817790][ T4688] ? kmsan_get_metadata+0xa4/0x120 [ 3348.819243][ T4688] ? kmsan_get_metadata+0xa4/0x120 [ 3348.819243][ T4688] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3348.819243][ T4688] kmsan_internal_check_memory+0x49f/0x560 [ 3348.840001][ T4688] kmsan_copy_to_user+0xe1/0xf0 [ 3348.846501][ T4688] ? should_fail_usercopy+0x39/0x40 [ 3348.850856][ T4688] _copy_to_user+0x1c9/0x270 [ 3348.850856][ T4688] fb_read+0xa42/0xc80 [ 3348.860266][ T4688] ? fb_seq_show+0x1a0/0x1a0 [ 3348.865143][ T4688] vfs_read+0x6c8/0x1980 [ 3348.869519][ T4688] ? ieee80211_if_change_type+0x12d0/0x14e0 [ 3348.870995][ T4688] ? kmsan_get_metadata+0xa4/0x120 [ 3348.880341][ T4688] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 3348.886238][ T4688] ksys_read+0x28c/0x520 [ 3348.890556][ T4688] __ia32_sys_read+0xdb/0x120 [ 3348.890556][ T4688] __do_fast_syscall_32+0x96/0xf0 [ 3348.900981][ T4688] do_fast_syscall_32+0x34/0x70 [ 3348.905347][ T4688] do_SYSENTER_32+0x1b/0x20 [ 3348.909708][ T4688] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 3348.911155][ T4688] RIP: 0023:0xf6f3c549 [ 3348.920685][ T4688] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 3348.940385][ T4688] RSP: 002b:00000000f5f365fc EFLAGS: 00000296 ORIG_RAX: 0000000000000003 [ 3348.949249][ T4688] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 3348.957512][ T4688] RDX: 000000000000002d RSI: 0000000000000000 RDI: 0000000000000000 [ 3348.965037][ T4688] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3348.970858][ T4688] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3348.980280][ T4688] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3348.989641][ T4688] [ 3348.990932][ T4688] Kernel Offset: disabled [ 3348.990932][ T4688] Rebooting in 86400 seconds..