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", 0x1000}, {&(0x7f0000003bc0)="6937cbb26c098c42b878f6c4b600d46411dc95fffc03075dcec8efa728e98fe91873fc4245a8968065e651801b55198aaf8e509eea61e58a3a1f159c2efefd06fbe1844d9127c26319b5098f11736a4ae9a5f0b0507a5bac4c45a102ba8babc87f05df99784e7ce4d25a95669285c2de6d113063212e7048f0bdd4a110370589412155544217b3150de885d106059557c5c6d0167671dcf609d34f1f41efba5514dd089572b390fd4a8fa79db7cb029ca9c201ec5104c160b520aa03ab4b7912ba53cc5fcfdd819f86b347a40aa330caf19bca91c19c261ed1fd5abd2b8d17468c660d4fd30097", 0xe7}], 0x6, &(0x7f0000003f40)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}], 0x20}, {&(0x7f0000003f80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004240)=[{&(0x7f0000004000)="1ae79d98ca912f7ed3e3ed27048ddf139e25e0c0e0c507dd1b881a70353b9e2684fb55df", 0x24}, {&(0x7f0000004040)="ec16c9f5f7fcd380874b3ed900feae0da8e4852c2577ed22d435b9fa19ed2443ca5844b88af66251b32ef6b4e2bbfac1534a2f51de4231964ed553a0bbaaf9ab3ed73e", 0x43}, {&(0x7f00000040c0)="cd83460a4becd2c00dce33ba29e3d23d7511b7266e851ccda0b1c98474b8ad741a0aa149fe9d9c39056c27cc630317c7ef3414ed5724fe79dcdd6cf9d9df0e2e5affd76720945b3136dabc3bf8175cda5cb3dd33685cd016b67dcd30f2e45543db8040a91e23f85d177edfc63ff8d6a12ce312618d86c6b1895adac4ebf3cc1c50800ad6c3f764fdfa8ab33c136b5d29", 0x90}, {&(0x7f0000004180)="b048851762dce5d5457e43408bc786608ac34a1a212fa96bd92bccf83cc45c32", 0x20}, {&(0x7f00000041c0)="804c54a4ee1013b1113c041b32bd32087d3d1a9afcd0b378", 0x18}, {&(0x7f0000004200)="baeabe16f04509", 0x7}], 0x6, &(0x7f00000043c0)=[@cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0x48, 0x4000}, {&(0x7f0000004440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004740)=[{&(0x7f00000044c0)="d47f278f997ef98370e7e9c4b9f446a8c0fb5d171ed697294dfe0e267773381fe289a6299715eab6ea3f8162ca959d8acda2251eba462dea24ce29cd7aef4634e340f9bd75d773e44ce7a5c0ca1e6270b478a3047ed242f3ac87a180122645fd31941eb2b396acee15c96e6ddcb0a2a4c88cd5627ad8ca73e90ffb6fee9f1796623b5da223c7417e9a106684b7", 0x8d}, {&(0x7f0000004580)="6dd3bb7ada46b389fbb6d29f3c6fcea20d13c798131d1ab84aaa4ce7851dd984e031865f6288e2862d6c32a8d3248ce6f624d4307af734573d5381df809056de52e775778d3e466be315f14a8d6f00b86f6d1b4e6383874c72", 0x59}, {&(0x7f0000004600)="6ef16e5499ea8f06ea19bf922f97af540ce4a7d18240423205d224607c9baf53e4d607e5141fbd008f972d072c556d15ea30e2697df5b557300bfadaf4a543c7b06dd58ad3107f5a0b530fab09346ed3400cc734d8a3f5c6da643fd829fc0c2f340abdc97bee8ce68f35e541180611889308937327dbe729214c73f3bc31fc592d", 0x81}, {&(0x7f00000046c0)="9e7a92bb4eec9b1915e12c7285a39fd7b8b6e4f961f3b4a8dfe3e9da7e1df9166dca5bf2fe54fe1c3bd5097ee092d2b437a03b184bf0fc31572ca9b7f57f4b4ee3b732ea907135999810e945bd2749", 0x4f}], 0x4, &(0x7f0000004c40)=[@cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0x128, 0x10}, {&(0x7f0000004d80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005080)=[{&(0x7f0000004e00)="8eddd87608b163cac452dd576787d1ca71394a03e196d39c4202872ddba4baeb8de4a9b9f8acbcdd3b7d7ce2016ae5803c5f4a62077ec6f560cb12496ca539e4", 0x40}, {&(0x7f0000004e40)="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", 0xfb}, {&(0x7f0000004f40)="56752c8f790469953783c92d66062c989966df3537df63bfa2f4a2a4", 0x1c}, {&(0x7f0000004f80)="92f23262d9efdeb135f23b4046d4c8fb3d73d1418bcbbe50f0a79efdcdcc23b5b91dd70ec54af02d280ec6d9bc191d6442a61e8c27da5d6efbff1facd0a5056535a3a5a478cb6979ea1f3432da3fd9b306b8452ec8f422d75f7fe3e6d31fe5", 0x5f}, {&(0x7f0000005000)="51be52a28206d6", 0x7}, {&(0x7f0000005040)="f92c875c3f75a914cde3fd25ecab492b36089713a733b4bdad966c239b2c4e7fe6b4eaa7", 0x24}], 0x6, &(0x7f0000005700)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @rights={0x18, 0x1, 0x1, [r0]}], 0xd0}, {&(0x7f0000005800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006c00)=[{&(0x7f0000005880)="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", 0xfa}, {&(0x7f0000005980)="2388bbd8de1e331bab071fd681c2e31bc88bc685e964ff5d208569b689300f5891f5d5887c048698842397a7511e28b2cdd25f8ce974ebae8a3bcbcf8e254c0581486399b9cb71c378e1bd8eff5d2624b6e98a2231a2e7919bcc5c87bfb1a9a1e286a9e4fb469d2638af9f9638666d375ab964ee747864c7a28a811f53", 0x7d}, {&(0x7f0000005a00)="53f638738cffb1d2a35da72ff114ad12ed73d78872480bbabfd82a075c439c037db55b35a487c996fbf1237b1a0d5b1d848ed53e87834d973abdb6a0b3274f2cd6b0c2334d32af90fdffa6f390d78ec47b9451dd2818d6ddb4ea3d7893d7", 0x5e}, {&(0x7f0000005a80)="67e28418dae4cff39240db8f11ea5c22edf6a44e5aed74fef4cb6a24a103fd42f60ca208f3b2e75ae13bc0713d47eb6427163ffe8d734d212a82", 0x3a}, {&(0x7f0000005ac0)="f50e39097607e94aff9fec13fb0d6496a096dab78dd839dfa2533f1a2e08b8c1afc1b47188fc86449e60b96ad4a8c5a11ef991a3fc1fb9cfb07283cdc1a4bcc84c6dccb0b7f6acd2099adefbe160079d3e35e2337fe43c2dc49325469bdd89b354dcd744ae3735e19440007ee64492691a558bfb73c29e7caf9751bf8bc3c94a0c46ac69067ca338c1235d29c0cdeab435f68552ebc816b1a213f3ec0bfdc1770ba78774e2a1d2aa2071e3b66b88e54611cc7a2a088e0ae0fc593174ac8cd8aea22a3c8423b316c2f10562b4f5c1c2f4d18c928d0d4553834e79b4f9023969ca995346b42b4ebaddfe97846af334", 0xee}, {&(0x7f0000005bc0)="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", 0x1000}, {&(0x7f0000006bc0)="52aad5f0934c42d9b8c5d506", 0xc}], 0x7, &(0x7f0000006f80)=[@rights={0x28, 0x1, 0x1, [r0, r0, r34, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r35, r36, r37}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r38, r39, r40}], 0xa0, 0x1}, {&(0x7f0000007040)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000073c0)=[{&(0x7f00000070c0)="7870d7e13873639a3c9249345387fdc6cc8117fb82bd03f1201d76476da1e49c9024bfa0e9762a103e423084c0433b24038d4c3d3da8ec2d32efd0f4ccb7b833726cd9f041c35a5a7915019128c0b320260315ee765076c6b2f192259d3ba592b8017cf3e1bdcaec474588e8222389f689ecfba4129c4de7596fda37a7c756baa51baf33c440e2c8ba69f4ff487e528e", 0x90}, {&(0x7f0000007180)="de851b17c5adfbab005b3a4acc0c4d1048faf29bae9f125d670e532ec996965d83edae181e", 0x25}, {&(0x7f00000071c0)="d5f989550ea8d1ace761ec1be93aa8aed7d6cadfd49e0e344a8c43061e2b9fc9719c75093ec1d0228a6e49b9d3300b93da697bcc2d02573d0f484ce9cd27f37adddd44406a2a83826fcf47a3052d76b556204e93ae3cb01fde5b6b61cedb45b4e5ef953107f63a7b7c095c14c7b1d939c5e70b43fe89e21a477734b53b29561ad0a68152f537c99fc181b8ef365108c5c4b9928880498133dc0684d86b477baff32a07f9", 0xa4}, {&(0x7f0000007280)="0498e5f0739815f3f2ff08a47fbf16e90ac264b5a0f40c8bca90031388005180b610494ab75ee5ee5242fcdb2c8c3b0b9b0c2fe8afff3178bb0d435b1aad83c7377fc8133c09d2d7974437b397cdae242a8133757f1186379868756b628cb636681ec442018a1944aeb028a45f45a2f513869f26c221b0ec171a24a9aede81f6b953ce5f624d7dc64e7e368385a5a936f7199e59c0180b3cdd34747834dcad4f34fa048c4c2c3cb6801e1b33c0ebeddb82bdf6df69421a9384bbdc6b98a2d05b9cbd26c19051b0fbcadd435b49ddf2b11bf2adaef0b253e7b4376bdbd5d36f685c8dbdeeac1af8a1c184a12090c1a6ff10672cb298e8acffdecb3d", 0xfb}, {&(0x7f0000007380)="f1", 0x1}], 0x5, &(0x7f0000007900)=[@cred={0x20, 0x1, 0x2, r41, r42, r43}, @cred={0x20, 0x1, 0x2, r44, r45, r46}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x60, 0x50}], 0x8, 0x78092b2a80078dd7) r47 = memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$BLKDISCARD(r47, 0x1277, &(0x7f0000000040)=0x7f) mkdir(0x0, 0x0) 13:45:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {0x0}], 0x2) 13:45:28 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000067001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa14f}, 0x48) 13:45:28 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x200000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001500)=""/135, 0x87}], 0x1) 13:45:29 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400001058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:29 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x20c800, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000004c0)={0x0, @reserved}) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000100)="1db33708d82bac78a5daa7bcd40e737f9fc9e18abb44286fe0aecfb7c65f6255fe19d16b5fb210ffbfd6b138fa5ab3769f97ad2fc40025ef00e46ab1936dee50236ce3ebcbf3fe1d0128eecaf036520db60c26356f552c5f3faca86dc9f2147b9cb2833558212cf10261a8f58aa5c32534ebc81fd73db5319b9e42d7efe3ee6405daff9c5c39d8ed7cc2dff26e52209f24ce14ffb36c2fc324c4727010494c367930a50b9a11fc5e58c076811ff546b22fbab325bb3557269c52abf0f7e7e16dfd5c", 0xc2}, {&(0x7f0000000200)="b61e3bb2678b4c8e98c3d11956eb2ff801db299665aaa8c4b35892b51e07b6e35ed02062096c33799002e48f043499c02d6a587489637a5d823ff8a2ead7f24341a42fdae4fd7f8d5d9b1c3695e814b62860a77d3226d3f98a8e919ad289cd7896c7e665c01712d259e31e3269b2733cbb4fce25806703e9f52490b9fbe08a21751c189cafd41c047b2126bcff41b75b34508cdbf0d509c391f8d6afd69de7db6e66938bf145901ac8d0dfb958d58426798497416b80bdf31b56c6a15bb98ec949343d878480d68c7a1e4f05f21c108032c3cd260b89bf2aab62ab736406a08d512a247c5a3c5cbfc62c6b302e3f4404b00dd92ee202a096510029802536", 0xfe}], 0x2, &(0x7f0000000340)=[@init={0x18, 0x84, 0x0, {0xbfcf, 0x6, 0x10000, 0x7}}, @dstaddrv6={0x20}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x3}}, @authinfo={0x18, 0x84, 0x6, {0x3}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x1ff}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0xd8, 0x4}, 0x20000000) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)={0x0, r1}) r2 = dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) connect$netlink(r2, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x30000}, 0xc) 13:45:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x2000000000000000]}, 0x10) 13:45:29 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x3f00}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x5500}, 0x48) 13:45:29 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001500)=""/135, 0x87}], 0x1) 13:45:29 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000858001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3}, 0x48) 13:45:29 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x8, &(0x7f00000000c0)={0x100000004}) socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000080)={0x2, 0x10001}) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) fcntl$notify(r1, 0x402, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) msgget(0x2, 0x88) mkdir(0x0, 0x0) 13:45:29 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3f00000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:29 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000458001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001500)=""/135, 0x87}], 0x1) 13:45:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) 13:45:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x700000000000000]}, 0x10) 13:45:30 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x20000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:30 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0xfe) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, 0xffff, 0x0, 0xffffffff, 0xffffffff, 0x9, 0x3, 0x453, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x5, 0x4, 0x8, 0xfffffffffffffff8, 0x9, 0x1000, 0x67a, {r3, @in6={{0xa, 0x4e22, 0xa2, @ipv4={[], [], @remote}, 0x9cc}}, 0x6, 0x1, 0x4, 0xffffffffffff05a1, 0x1000}}, &(0x7f00000002c0)=0xb0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{0x0}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:30 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000258001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4fa1}, 0x48) 13:45:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{0x0}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:30 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000358001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:30 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x2000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:30 executing program 2: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x6, 0x1) setsockopt$inet_buf(r0, 0x0, 0x11, 0x0, 0xd0e8115b106e1eed) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4000000000000000}, 0x48) 13:45:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{0x0}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0xff0f]}, 0x10) 13:45:31 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000f58001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:31 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x200000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:31 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r0 = memfd_create(0x0, 0x0) r1 = dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 13:45:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1000000}, 0x48) 13:45:31 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x1000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x200000}, 0x48) 13:45:31 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x1000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:31 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000067001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:31 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)=0x6) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$sock_ifreq(r1, 0x894a, &(0x7f0000000100)={'vcan0\x00', @ifru_data=&(0x7f00000000c0)="5e62a3b9c8b7de4f25ed5a8cdf21fffe6a2e91026c6ecff3408a19d253592a49"}) mkdir(0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x4) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000140)={{0x2, 0x4e23, @remote}, {0x307}, 0x20, {0x2, 0x4e20, @multicast1}, 'dummy0\x00'}) 13:45:31 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r0 = socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() r4 = getegid() lstat(&(0x7f0000000740)='./file0/file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0, 0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000009c0)=[r1, r2, r3, r4, r5, r7, r9, r10]) stat(0x0, 0x0) setpgid(r8, r6) memfd_create(0x0, 0x0) r11 = dup(0xffffffffffffff9c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vga_arbiter\x00', 0x40, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000280)='\x00'], &(0x7f0000000580)=[&(0x7f0000000300)='cgroup\x00', &(0x7f0000000340)='\\)\x00', &(0x7f0000000380)='!\x00', &(0x7f00000003c0)='!\x00', &(0x7f0000000400)='!\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='!\x00', &(0x7f0000000500)='!\x00', &(0x7f0000000540)='.\x00']) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="66d0fd248be000000000512bf00d4a9d20274bdbc909606fd6cd0f235c01abaa4577d43cb65b746a3c3c999af7c458e01542991661578ed149b8bc2c438b11c52cadcf99e67c86bec7040000004d03e98ae991d325521a52d24a2461293fbb6dedc0b76a37000000000000002d8878555060b733d57b560335383663109ce9000000000000"], &(0x7f0000000180)='!\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4$unix(r11, &(0x7f0000000040)=@abs, &(0x7f0000000140)=0x2ca, 0x80002) 13:45:31 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="240000000f001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x861a]}, 0x10) 13:45:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x40000000}, 0x48) 13:45:32 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3f000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:32 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000100), &(0x7f0000000180)=0x4) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet_buf(r1, 0x0, 0xfffffffffffffffd, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r2 = socket$key(0xf, 0x3, 0x2) listen(r2, 0x7ff) stat(0x0, 0x0) r3 = memfd_create(0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x4, 0x2]) r4 = socket$inet6(0xa, 0x200000000000803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket(0x40000000015, 0x40000000000005, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f00000001c0)={0x3, 0xff}) setsockopt(r5, 0x100000114, 0x1d, &(0x7f0000c63ffc)="66014ebe", 0x0) getsockopt$sock_int(r5, 0x1, 0x1d, &(0x7f00003e9ffc), &(0x7f0000727ffc)=0x4) mkdir(0x0, 0x0) 13:45:32 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x880, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000200)={0x0, 0x3, 0x4}) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000140)={r2, 0x3}, 0x8) creat(&(0x7f0000000180)='./file0\x00', 0x40) 13:45:32 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058041f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x500}, 0x48) 13:45:32 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:memory_device_t:s0\x00', 0x25, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:32 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:32 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3f00}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:32 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058021f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) [ 1986.989416] FAULT_INJECTION: forcing a failure. [ 1986.989416] name failslab, interval 1, probability 0, space 0, times 0 [ 1987.028078] CPU: 0 PID: 27863 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #361 [ 1987.035497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1987.044873] Call Trace: [ 1987.047483] dump_stack+0x244/0x39d [ 1987.051133] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1987.056363] ? debug_smp_processor_id+0x1c/0x20 [ 1987.061070] ? perf_trace_lock+0x14d/0x7a0 [ 1987.065334] should_fail.cold.4+0xa/0x17 [ 1987.069411] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1987.074520] ? seq_read+0x71/0x1150 [ 1987.078171] ? mutex_trylock+0x2b0/0x2b0 [ 1987.082246] ? find_held_lock+0x36/0x1c0 [ 1987.086326] ? zap_class+0x640/0x640 13:45:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2}, 0x48) [ 1987.090089] ? find_held_lock+0x36/0x1c0 [ 1987.094215] ? __lock_is_held+0xb5/0x140 [ 1987.098314] ? perf_trace_sched_process_exec+0x860/0x860 [ 1987.103791] __should_failslab+0x124/0x180 [ 1987.108065] should_failslab+0x9/0x14 [ 1987.111889] kmem_cache_alloc_node_trace+0x270/0x740 [ 1987.117022] ? find_held_lock+0x36/0x1c0 [ 1987.117071] __kmalloc_node+0x3c/0x70 [ 1987.117099] kvmalloc_node+0x65/0xf0 [ 1987.117119] seq_read+0x99b/0x1150 [ 1987.117165] ? fsnotify_first_mark+0x350/0x350 [ 1987.117186] ? __fsnotify_parent+0xcc/0x430 [ 1987.128746] ? seq_escape+0x240/0x240 [ 1987.128770] proc_reg_read+0x2a3/0x3d0 [ 1987.128796] ? proc_reg_unlocked_ioctl+0x3c0/0x3c0 [ 1987.128822] ? security_file_permission+0x1c2/0x220 [ 1987.136924] ? rw_verify_area+0x118/0x360 [ 1987.136947] do_iter_read+0x4a3/0x650 [ 1987.136981] vfs_readv+0x175/0x1c0 [ 1987.137004] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1987.137029] ? wait_for_completion+0x8a0/0x8a0 [ 1987.137065] ? mutex_lock_nested+0x16/0x20 [ 1987.145165] ? mutex_lock_nested+0x16/0x20 [ 1987.145183] ? __fdget_pos+0xde/0x200 [ 1987.145201] ? __fdget_raw+0x20/0x20 [ 1987.145221] ? __sb_end_write+0xd9/0x110 [ 1987.145248] do_readv+0x11a/0x310 [ 1987.154056] ? vfs_readv+0x1c0/0x1c0 [ 1987.154080] ? trace_hardirqs_off_caller+0x310/0x310 [ 1987.154107] __x64_sys_readv+0x75/0xb0 [ 1987.154143] do_syscall_64+0x1b9/0x820 [ 1987.163327] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1987.163373] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1987.163390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1987.163411] ? trace_hardirqs_on_caller+0x310/0x310 [ 1987.163430] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1987.163450] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1987.250886] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1987.255742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1987.260932] RIP: 0033:0x457569 [ 1987.264124] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1987.283123] RSP: 002b:00007f9d94574c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1987.290869] RAX: ffffffffffffffda RBX: 00007f9d94574c90 RCX: 0000000000457569 [ 1987.298143] RDX: 0000000000000002 RSI: 0000000020001680 RDI: 0000000000000003 [ 1987.305431] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1987.312697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d945756d4 [ 1987.319960] R13: 00000000004c37f6 R14: 00000000004d5e48 R15: 0000000000000004 13:45:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0xff0f000000000000]}, 0x10) 13:45:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') mkdir(0x0, 0x0) 13:45:32 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="24000000580f1f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:32 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x2000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3f00}, 0x48) 13:45:32 executing program 1 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) [ 1987.687991] FAULT_INJECTION: forcing a failure. [ 1987.687991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1987.699843] CPU: 1 PID: 27886 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #361 [ 1987.707204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1987.716563] Call Trace: [ 1987.719176] dump_stack+0x244/0x39d [ 1987.722824] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1987.728022] ? zap_class+0x640/0x640 [ 1987.731759] should_fail.cold.4+0xa/0x17 [ 1987.735864] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1987.740982] ? debug_smp_processor_id+0x1c/0x20 [ 1987.745653] ? perf_trace_lock+0x14d/0x7a0 [ 1987.749906] ? lock_is_held_type+0x210/0x210 [ 1987.754317] ? lock_downgrade+0x900/0x900 [ 1987.758479] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1987.763409] ? kasan_check_read+0x11/0x20 [ 1987.767558] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1987.772893] ? zap_class+0x640/0x640 [ 1987.776613] ? rcu_softirq_qs+0x20/0x20 [ 1987.780666] ? rcu_read_unlock+0x16/0x60 [ 1987.784743] __alloc_pages_nodemask+0x366/0xea0 [ 1987.789417] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1987.794353] ? kasan_check_read+0x11/0x20 [ 1987.798509] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1987.803540] ? __lock_is_held+0xb5/0x140 [ 1987.807694] ? trace_hardirqs_off+0xb8/0x310 [ 1987.812143] cache_grow_begin+0xa5/0x8c0 [ 1987.816238] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1987.821778] ? check_preemption_disabled+0x48/0x280 [ 1987.826807] kmem_cache_alloc_node_trace+0x670/0x740 [ 1987.831923] ? find_held_lock+0x36/0x1c0 [ 1987.836005] __kmalloc_node+0x3c/0x70 [ 1987.839815] kvmalloc_node+0x65/0xf0 [ 1987.843532] seq_read+0x99b/0x1150 [ 1987.847103] ? fsnotify_first_mark+0x350/0x350 [ 1987.851713] ? __fsnotify_parent+0xcc/0x430 [ 1987.856064] ? seq_escape+0x240/0x240 [ 1987.859877] proc_reg_read+0x2a3/0x3d0 [ 1987.863780] ? proc_reg_unlocked_ioctl+0x3c0/0x3c0 [ 1987.868729] ? security_file_permission+0x1c2/0x220 [ 1987.873753] ? rw_verify_area+0x118/0x360 [ 1987.877911] do_iter_read+0x4a3/0x650 [ 1987.881738] vfs_readv+0x175/0x1c0 [ 1987.885290] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1987.890690] ? wait_for_completion+0x8a0/0x8a0 [ 1987.895302] ? mutex_lock_nested+0x16/0x20 [ 1987.899539] ? mutex_lock_nested+0x16/0x20 [ 1987.903786] ? __fdget_pos+0xde/0x200 [ 1987.907600] ? __fdget_raw+0x20/0x20 [ 1987.911340] ? __sb_end_write+0xd9/0x110 [ 1987.915429] do_readv+0x11a/0x310 [ 1987.918937] ? vfs_readv+0x1c0/0x1c0 [ 1987.922679] ? trace_hardirqs_off_caller+0x310/0x310 [ 1987.927802] __x64_sys_readv+0x75/0xb0 [ 1987.931704] do_syscall_64+0x1b9/0x820 [ 1987.935615] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1987.940988] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1987.945937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1987.950793] ? trace_hardirqs_on_caller+0x310/0x310 [ 1987.955822] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1987.960875] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1987.965902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1987.970775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1987.975965] RIP: 0033:0x457569 [ 1987.979163] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1987.998066] RSP: 002b:00007f9d94574c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1988.005774] RAX: ffffffffffffffda RBX: 00007f9d94574c90 RCX: 0000000000457569 [ 1988.013056] RDX: 0000000000000002 RSI: 0000000020001680 RDI: 0000000000000003 [ 1988.020322] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1988.027603] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d945756d4 [ 1988.034905] R13: 00000000004c37f6 R14: 00000000004d5e48 R15: 0000000000000004 13:45:33 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x1000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:33 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058081f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xff00}, 0x48) 13:45:33 executing program 1 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:33 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x65f5, 0x10200) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000200)=[{}, {}], 0x0, [{}]}, 0x88) dup(0xffffffffffffff9c) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x5, 0x10000) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02f814481298690b57fb33d17b0f4d00fcbf353e90e44c7c6c9ad80465ee4c80ee697274b4fa"], 0x9, 0x1) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x4800, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000340)=r1) ptrace$setopts(0x4200, r2, 0x3, 0x1) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2000}, 0x48) 13:45:33 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058101f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:33 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x100000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x1000000]}, 0x10) 13:45:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xffffff80}, 0x48) 13:45:33 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r0 = dup(0xffffffffffffff9c) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000040)={0xffffffffffffffff, "ad4fdfe7376319b437ac3686c522ebb7090caedab89b19e5758321b7ebd3d6e7", 0x3, 0x7ff, 0x2, 0xff}) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:33 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x200000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:33 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058031f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x200014e0}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xffff8000}, 0x48) 13:45:33 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) membarrier(0x0, 0x0) mkdir(0x0, 0x0) 13:45:33 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f05ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:34 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xffffffff00000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x7ffff000}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x3]}, 0x10) 13:45:34 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000040)=""/160, &(0x7f0000000100)=0xa0) 13:45:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe4ffffff00000000}, 0x48) 13:45:34 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f03ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:34 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x20001587}], 0x2) 13:45:34 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff00000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:34 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_dccp_int(r0, 0x21, 0xf, &(0x7f0000000080)=0x8001, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:34 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9102304000a04f511080001000201009f0800028001000000", 0x24) 13:45:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x7fffefa0}], 0x2) 13:45:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3f000000}, 0x48) 13:45:34 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:35 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9032304000a04f511080001000201009f0800028001000000", 0x24) 13:45:35 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x20000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x1802000000000000]}, 0x10) 13:45:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x90ffffff}, 0x48) 13:45:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x32}], 0x2) 13:45:35 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0xf, &(0x7f0000000100)={0x400000000000000}) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x3) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:35 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:35 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r0 = socket$key(0xf, 0x3, 0x2) ioctl$int_in(r0, 0x0, &(0x7f0000000200)=0x8) stat(0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "cb8b4e34a76368fd2956470ece65284a25a439c3"}, 0x15, 0x3) r1 = memfd_create(0x0, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x9, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) dup(r1) ioctl$BLKZEROOUT(r1, 0x127f, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000180)={@multicast1, @local}, &(0x7f00000001c0)=0xc) mkdir(0x0, 0x0) 13:45:35 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9042304000a04f511080001000201009f0800028001000000", 0x24) 13:45:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x8) 13:45:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x5500000000000000}, 0x48) 13:45:35 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') mkdir(0x0, 0x0) 13:45:35 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x2000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:35 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9022304000a04f511080001000201009f0800028001000000", 0x24) 13:45:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x100000000000000]}, 0x10) 13:45:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000100)=""/236) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:36 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r0 = dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000040)) mkdir(0x0, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0x8f, &(0x7f0000000080)=""/227, &(0x7f0000000180)=0xe3) 13:45:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x20000000000000}, 0x48) 13:45:36 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f90f2304000a04f511080001000201009f0800028001000000", 0x24) 13:45:36 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x3f000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:36 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9082304000a04f511080001000201009f0800028001000000", 0x24) 13:45:36 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x668, 0x80) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x80, 0x1, 0x7}, 0x101}}, 0x18) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x2, 0x20, 0x7, 0x0, 0x4, 0x1000, 0x2, 0x100000000, 0xffff, 0x5, 0x9, 0xf4, 0x27b1, 0x80000000, 0xffffffffffffff7f, 0x8, 0x384, 0x7070, 0x0, 0x0, 0x20, 0xfffffffffffffff9, 0x8000, 0x5, 0x9, 0xffffffff, 0x7, 0x5b, 0xfffffffffffffffe, 0x9257, 0x7ba, 0x7, 0xae39, 0xc681, 0x1a69, 0x0, 0xda, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x10, 0x401, 0x8000, 0x4, 0x4, 0xfe4f, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0x3) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x100000}, 0x48) 13:45:36 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x408402, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x49c000, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="bdc9c19479b0e10ad8aae978d25f25c6f81c7470e904c9d566845a04e1d99a5c541b00c5e5") readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000000)={{0x9d, 0x200}, 0x5f}, 0x10) 13:45:36 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:36 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002303000a04f511080001000201009f0800028001000000", 0x24) 13:45:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x129b9b6800000000]}, 0x10) 13:45:37 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x2000) sync_file_range(r0, 0x3f, 0x3, 0x4) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:37 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa000000}, 0x48) 13:45:37 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x80000) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000000c0)={@rand_addr, @multicast1}, &(0x7f0000000100)=0x4) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) prctl$PR_SET_SECUREBITS(0x1c, 0xa) mkdir(0x0, 0x0) 13:45:37 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f90023040f0a04f511080001000201009f0800028001000000", 0x24) 13:45:37 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304080a04f511080001000201009f0800028001000000", 0x24) 13:45:37 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x2000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x7000000}, 0x48) 13:45:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680), 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x10000000, 0x9, 0x1, 0x80000000, 0x7, 0x9, 0x9f17, 0x401, 0x0}, &(0x7f0000000040)=0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0x50, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r2, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r1, @in={{0x2, 0x4e24, @multicast2}}, 0x6, 0x8d, 0x7, 0xe000000000000000, 0xb1}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={r1, 0xbb, "dbddaac2934aca1740caf7408995289c2cf86e3a653e5a4e27d8fc3b493fb35d0b4ef2bb0616b37e0209aa04ca0e805b944bd3e93137a9d873fcb286cab1673a0a178ebfb0ad91b7e23abfebc9c161eb743b30fe06e32835d0095cdf67c75a5f6efc4c7df0c268c2d4abd72b01f09a6e64ba408578021a2627498fb5fbec1a6051728846b3da3875615923cb5abe20f94af7bf2a43b1255eeb002044ff5522bcd1b898003709eceb2671c6d8bfd5496a9b609ffca7c9b836d9f67b"}, &(0x7f0000000080)=0xc3) 13:45:37 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) preadv(r0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/68, 0x44}, {&(0x7f00000000c0)=""/74, 0x4a}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x3, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000001280)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x40020000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)=ANY=[@ANYBLOB="65020000", @ANYRES16, @ANYBLOB="040927bd7000fcdbdf250c00000008000600ffff0000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x84) mkdir(0x0, 0x0) 13:45:37 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304100a04f511080001000201009f0800028001000000", 0x24) 13:45:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x5000000000000]}, 0x10) 13:45:38 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:38 executing program 1: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000000)='\x00\x00\x00\x00\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x500000000000000}, 0x48) 13:45:38 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r0 = socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304020a04f511080001000201009f0800028001000000", 0x24) 13:45:38 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x200000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000000000)=""/135, 0x87}], 0x2) 13:45:38 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f00000000c0)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304030a04f511080001000201009f0800028001000000", 0x24) 13:45:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x8000000000000000}, 0x48) 13:45:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe4ffffff}, 0x48) 13:45:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xfffffffe]}, 0x10) 13:45:39 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) close(r0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:39 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x3f00000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:39 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304040a04f511080001000201009f0800028001000000", 0x24) 13:45:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x300}, 0x48) 13:45:39 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000300)="6e65742f6970365f33b95b7f3ebfe1ac7cfdd897bc6d87725f76696600") readv(r1, &(0x7f0000000080)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000180)={0x1, 0x7f, {0x34f, 0xfffffffffffff800, 0x6001, 0x2, 0x1, 0x6, 0x1, 0x2}}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100), 0x4) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000040)={0x40, 0x3f, 0x80, [], &(0x7f0000000000)=0x6}) syz_open_procfs(r0, &(0x7f00000000c0)='net/netstat\x00') ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 13:45:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd00}, 0x48) 13:45:39 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304008104f511080001000201009f0800028001000000", 0x24) 13:45:39 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x3f00}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:39 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="8fc978d2c20ffe01660f3a613faec461d5ef432f0f0db200800000432a1dcc000000f3ab0f0f348ea4420f2aae0a800000c441f8174a00") 13:45:39 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc0}, 0x48) 13:45:40 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x80000000000000, 0x0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r0 = dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) connect$pppoe(r0, &(0x7f0000000300)={0x18, 0x0, {0x1, @remote, 'ip_vti0\x00'}}, 0x1e) mkdir(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000240)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0xb, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x100000000, 0xd, 0x9, 0xb, 0xfffffffffffffffe, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x5, 0x0, 0xf, 0x6, 0x14}, @exit, @exit, @jmp={0x5, 0x4, 0x7, 0xf, 0x3, 0xfffffffffffffff8}, @alu={0x7, 0x10000, 0xf, 0xf, 0xf, 0x1, 0xfffffffffffffffc}, @ldst={0x1, 0x2, 0x6, 0xe, 0xf, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x4, 0x2, 0x4, 0x6, 0xc, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x16, &(0x7f0000000100)=""/22, 0x41f00, 0x1, [], r1, 0x1}, 0x48) 13:45:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x1802]}, 0x10) 13:45:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x7, {0x10000}}, 0x18) 13:45:40 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a03f511080001000201009f0800028001000000", 0x24) 13:45:40 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f00000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:40 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511030001000201009f0800028001000000", 0x24) 13:45:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd00000000000000}, 0x48) 13:45:40 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:40 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x57df) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r2 = open(&(0x7f0000000080)='./file0\x00', 0x2080, 0x40) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000100)={0x1, 0x2}) r3 = getpgid(0xffffffffffffffff) ftruncate(r1, 0x0) r4 = syz_open_procfs(r3, &(0x7f00000000c0)="6eba9844ff6d70baf4de") ioctl$LOOP_SET_FD(r1, 0x4c00, r1) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000140)) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:40 executing program 2: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000240)={@mcast2, r1}, 0x14) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000004c0)="dfbd5f3b43aed3e4b77009f8e9835087", 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000040)={0x7, 0x86, 0x401}) memfd_create(0x0, 0x5) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x4011, r2, 0x0) fchmod(r3, 0x141) dup(0xffffffffffffff9c) prctl$PR_SET_FP_MODE(0x2d, 0x1) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) [ 1995.020178] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:40 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x80ffff}, 0x48) 13:45:40 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511100001000201009f0800028001000000", 0x24) [ 1995.260857] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1995.293929] netlink: 'syz-executor3': attribute type 1 has an invalid length. 13:45:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x4002]}, 0x10) 13:45:40 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000040)=0x7) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x7fffffff, 0x10}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r1, @in={{0x2, 0x4e20, @multicast1}}, 0x8391, 0x7, 0x6, 0xd04f, 0x9}, &(0x7f0000000200)=0x98) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000c40)={0x3, 0x3, 0x0, 0x5, 0xd66}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getresuid(&(0x7f0000000c00), &(0x7f0000000340), &(0x7f0000000c80)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getresuid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000740)=0xe8) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000b40)={0x0, 0x81, [], @raw_data=[0x7ff, 0xffffffff, 0x2, 0x9, 0x7f, 0x4, 0x32274080, 0xff, 0x10000, 0x1, 0x401, 0x8, 0x7fffffff, 0x2, 0xffffffff00000001, 0x5, 0x7, 0xbcc1, 0x4, 0xf1b, 0x1c0, 0x1, 0x5816, 0x9, 0x6, 0x1ff, 0x7, 0x4, 0x1, 0x3c8b7565, 0x2, 0x7b18]}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000300)={r2, 0x5, 0x10, 0x9, 0x8001}, &(0x7f0000000380)=0x18) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000780)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@ipv4={[], [], @broadcast}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) r11 = getuid() lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000ac0)={{}, {0x1, 0x4}, [{0x2, 0x1, r3}, {0x2, 0x7, r4}, {0x2, 0x7, r5}, {0x2, 0x2, r6}, {0x2, 0x1, r7}, {0x2, 0x5, r8}, {0x2, 0x1, r9}, {0x2, 0x1, r10}, {0x2, 0x1, r11}, {0x2, 0x5, r12}], {0x4, 0x2}, [], {}, {0x20, 0x6}}, 0x74, 0x3) r13 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001000)=[{&(0x7f0000000cc0)=""/186, 0xba}, {&(0x7f0000000d80)=""/159, 0x9f}, {&(0x7f0000000e40)=""/184, 0xb8}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/194, 0xc2}], 0x5, 0x0) readv(r13, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:40 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) socketpair(0x2, 0x4, 0x7, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x0, @vbi={0x3, 0x9, 0x5, 0xf77b5f5b, [0x8, 0x10000], [0x4, 0xffff], 0x108}}) r1 = memfd_create(0x0, 0x2) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(r1, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:40 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x39431c00}, 0x48) 13:45:40 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511081001000201009f0800028001000000", 0x24) 13:45:41 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x200000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 1995.805234] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:41 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080301000201009f0800028001000000", 0x24) 13:45:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4000000}, 0x48) 13:45:41 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffdea) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r0 = semget$private(0x0, 0x1, 0x700) semctl$GETNCNT(r0, 0x7, 0xe, &(0x7f0000000080)=""/121) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = dup(0xffffffffffffff9c) write$P9_RATTACH(r2, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x10, 0x2, 0x6}}, 0x14) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) mkdir(0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xa) 13:45:41 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f00}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 1995.947773] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc000}, 0x48) 13:45:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x861a0000]}, 0x10) 13:45:41 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080401000201009f0800028001000000", 0x24) 13:45:41 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r0 = dup(0xffffffffffffff9c) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0xfffffffffffffe6a) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:41 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1c106a}, 0x48) 13:45:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) mq_open(&(0x7f0000000000)='net/kcm\x00\b\x00', 0x800, 0x1, &(0x7f0000000040)={0x9646, 0x0, 0x3f, 0x1, 0x3f, 0x7, 0x2, 0xae71}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) sched_getscheduler(r1) 13:45:41 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 1996.708145] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000001c0)={{0x2, 0x3, 0x4414, 0x3}, 0x8, 0xfffffffffffffff7, 'id1\x00', 'timer0\x00', 0x0, 0x1000, 0x5779, 0x85}) readv(r0, &(0x7f0000000000)=[{&(0x7f0000001480)=""/96, 0x108}, {&(0x7f0000000100)=""/135, 0x87}], 0x2) 13:45:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x40000000000000}, 0x48) 13:45:42 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080201000201009f0800028001000000", 0x24) 13:45:42 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) [ 1996.871457] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:42 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x100000000000000}, 0x48) 13:45:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x646c}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r1, 0x9, 0x20, 0x3b, 0x7fff}, &(0x7f0000000100)=0x18) 13:45:42 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080f01000201009f0800028001000000", 0x24) 13:45:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x18020000]}, 0x10) 13:45:42 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x200000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:42 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) [ 1997.627095] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x80ffffff00000000}, 0x48) 13:45:42 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff00000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x3de}], 0x2) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x102, 0x0) 13:45:43 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080223000201009f0800028001000000", 0x24) [ 1997.786781] device bridge_slave_1 left promiscuous mode [ 1997.792824] bridge0: port 2(bridge_slave_1) entered disabled state [ 1997.851989] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:43 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:43 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) 13:45:43 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080003000201009f0800028001000000", 0x24) [ 1997.892728] device bridge_slave_0 left promiscuous mode [ 1997.923816] bridge0: port 1(bridge_slave_0) entered disabled state 13:45:43 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff00000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 1997.969518] IPVS: ftp: loaded support on port[0] = 21 13:45:43 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080801000201009f0800028001000000", 0x24) [ 1998.084212] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. [ 1998.112763] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. [ 1998.122864] team0 (unregistering): Port device team_slave_1 removed [ 1998.149644] team0 (unregistering): Port device team_slave_0 removed [ 1998.187930] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1998.220047] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1998.301517] bond0 (unregistering): Released all slaves 13:45:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x500]}, 0x10) 13:45:43 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/sctp\x00') syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x802) ioctl$VT_RELDISP(r1, 0x5605) socket$bt_hidp(0x1f, 0x3, 0x6) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x218000, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) [ 1999.221134] bridge0: port 1(bridge_slave_0) entered blocking state [ 1999.228095] bridge0: port 1(bridge_slave_0) entered disabled state [ 1999.236265] device bridge_slave_0 entered promiscuous mode [ 1999.288995] bridge0: port 2(bridge_slave_1) entered blocking state [ 1999.295505] bridge0: port 2(bridge_slave_1) entered disabled state [ 1999.303828] device bridge_slave_1 entered promiscuous mode [ 1999.356526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1999.407743] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1999.590602] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1999.637405] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1999.855562] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1999.863528] team0: Port device team_slave_0 added [ 1999.909400] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1999.916918] team0: Port device team_slave_1 added [ 1999.962073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2000.008777] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2000.037976] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2000.044970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2000.053961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2000.101259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2000.108629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2000.125027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2000.447062] bridge0: port 2(bridge_slave_1) entered blocking state [ 2000.453407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2000.460074] bridge0: port 1(bridge_slave_0) entered blocking state [ 2000.466457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2000.473934] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2001.434037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2001.446078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2001.528832] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2001.621450] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2001.627783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2001.634729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2001.728689] 8021q: adding VLAN 0 to HW filter on device team0 13:45:47 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000080)) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040), 0x4) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:47 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:47 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080400000201009f0800028001000000", 0x24) 13:45:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd000000}, 0x48) 13:45:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$RTC_AIE_ON(r0, 0x7001) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x1a86]}, 0x10) [ 2002.465402] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000000300), 0x1000000000000223) ustat(0x0, &(0x7f0000000000)) 13:45:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xffffff90}, 0x48) 13:45:47 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:47 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) r0 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) mq_timedsend(r0, &(0x7f0000000200)="392d8560a33cb22dbe80eff1a606d05b7bdd4e0a7eb2c25d87036ec3a5335cf9ba0343f8ff66cb3df36d69a465031119270854512d8d7c16ad", 0x39, 0xe, &(0x7f0000000240)={0x77359400}) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000040)) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0xffffffffffffffff) 13:45:47 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f51108003f000201009f0800028001000000", 0x24) 13:45:47 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) prctl$PR_GET_FP_MODE(0x2e) mkdir(0x0, 0x0) 13:45:47 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x8000) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000100)={0x88, "0188b1d6cc9d14db570f08ccf7a5a1fb12e80a59e9db763982a37249f46d209a", 0x800, 0xfd, 0x9, 0x4, 0x4}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x4) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x2, 0x3, 0x3ff, 0xc2f7, 0x1c}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1c4339}, 0x48) 13:45:47 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f00000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:48 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:48 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080003000201009f0800028001000000", 0x24) 13:45:48 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fff, 0x400000) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xff00000000000000}, 0x48) 13:45:48 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x20000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x3000000]}, 0x10) 13:45:48 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080023020201009f0800028001000000", 0x24) 13:45:48 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r0 = socket$key(0xf, 0x3, 0x2) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x34, 0xffffffffffff2a56, 0x5, 0x0, 0x0, [{r0, 0x0, 0x16dcc3b2}, {r0, 0x0, 0x3}, {r0, 0x0, 0x1f}, {r0, 0x0, 0xe5}, {r0}]}) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:48 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:48 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) memfd_create(0x0, 0x0) r1 = dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(r1, 0x127f, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000000c0)={[0x0, 0xd000, 0x2, 0x100000], 0x5, 0x80, 0x3ff}) mkdir(0x0, 0x0) 13:45:48 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001030201009f0800028001000000", 0x24) 13:45:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x6a101c00}, 0x48) 13:45:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0xc3, 0x4) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) process_vm_readv(r1, &(0x7f00000013c0)=[{&(0x7f0000000080)}, {&(0x7f0000000100)=""/119, 0x77}, {&(0x7f0000000180)=""/240, 0xf0}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/203, 0xcb}, {&(0x7f0000001380)=""/20, 0x14}], 0x6, &(0x7f0000001440)=[{&(0x7f00000015c0)=""/90, 0x5a}, {&(0x7f00000016c0)=""/230, 0xe6}], 0x2, 0x0) 13:45:48 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x8000008000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000080)=0xffffffffffffffff) dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:48 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100000000000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xff000000}, 0x48) 13:45:48 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001040201009f0800028001000000", 0x24) 13:45:49 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = dup(0xffffffffffffff9c) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x2, "9782"}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x1000, "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"}, &(0x7f0000001100)=0x1008) 13:45:49 executing program 1: readv(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xff3, 0x10002) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0xc, 0x4, 0x4}, 0x1}}, 0x18) write$P9_RREMOVE(r0, &(0x7f0000000080)={0x7, 0x7b, 0x1}, 0x7) 13:45:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x40020000]}, 0x10) 13:45:49 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001020201009f0800028001000000", 0x24) 13:45:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x700}, 0x48) 13:45:49 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/raw\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:49 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x39431c0000000000}, 0x48) 13:45:49 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x7, 0x80e, 0xfffffffffffffffa, &(0x7f0000000080)={0xffffffffffffffff}) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = dup(0xffffffffffffff9c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x20) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000040)=r1) mkdir(0x0, 0x0) 13:45:49 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f5110800010f0201009f0800028001000000", 0x24) 13:45:49 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000501009f0800028001000000", 0x24) 13:45:49 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000000)=0x2) 13:45:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x500000000000000]}, 0x10) 13:45:50 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40, 0x0) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000080)=""/108) r1 = memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1000000000000}, 0x48) 13:45:50 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f00}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:50 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000301009f0800028001000000", 0x24) 13:45:50 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r2 = msgget(0x3, 0x40) msgctl$IPC_RMID(r2, 0x0) 13:45:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x400000}, 0x48) 13:45:50 executing program 2: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffff9c) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x701, 0x1) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) mkdir(0x0, 0x0) 13:45:50 executing program 1: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000240)='attr\x00') ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000100)="27a7c192aa3727f208bd18d8cd1e144a170b64c9e658408aab1536e526b24b0de93cc9cee1071f731089965d0f35e5b6f693319d1e7e3bce4f8c93325c8de3ecb89966537353a75e544ce6a700e2c6c1b32468d50736e9692df5d2402a37ce292a29be6072bf6447ce113550c98aed499866abcd7ec52f1cccf9e8210d86cc3c9fc03b7e3c97dbe90f965c0209008e3526bd67deeb1974bd0e33a7b13630500f314acc7d0a55aa0167f8a1045c79d5b713eb84857fbba11ee0daef47f1e3407c9aa1c5ce564912c0ef8e67a2c5074dc050ec45c802cdec31aa6edbe5e4f8477cdc2b") r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000000)={r3, 0x0, 0x7fffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000040)={r4, 0x80000, r2}) readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000280)={0x3, &(0x7f0000000200)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000002c0)={r5, 0x2}) 13:45:50 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001080201009f0800028001000000", 0x24) 13:45:50 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:50 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/connector\x00') 13:45:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x18]}, 0x10) 13:45:51 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200000}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:51 executing program 1: rt_sigpending(&(0x7f0000000040), 0x12d) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:51 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001100201009f0800028001000000", 0x24) 13:45:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3000000}, 0x48) 13:45:51 executing program 2: 13:45:51 executing program 2: 13:45:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x6, 0x0, {0x0, 0x0, 0x40000}}, 0x30) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x6, 0x1, 0x9, 0x6, 0x9, 0x4}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x0, 0x1, {0x80, 0x9, 0x2007, 0x0, 0x7, 0x1, 0x1, 0x2}}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000080)=0x7e) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r3, 0x9cc0}, 0x8) 13:45:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa14f0000}, 0x48) 13:45:51 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000301009f0800028001000000", 0x24) 13:45:51 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x20000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:51 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@md5={0x1, "0d1cc19e46cf2656477af24cf163332e"}, 0x11, 0x2) syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') 13:45:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x861a000000000000]}, 0x10) 13:45:52 executing program 2: 13:45:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa00}, 0x48) 13:45:52 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000501009f0800028001000000", 0x24) 13:45:52 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x3f00000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x800, 0x0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:52 executing program 2: 13:45:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x5}, 0x48) 13:45:52 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000203009f0800028001000000", 0x24) 13:45:52 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) syz_open_procfs(r0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 13:45:52 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x1000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:52 executing program 2: 13:45:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x200000000000000}, 0x48) 13:45:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 13:45:53 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000223029f0800028001000000", 0x24) 13:45:53 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x3f00}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x1802000000000000]}, 0x10) 13:45:53 executing program 2: 13:45:53 executing program 2: 13:45:53 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x2000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x80ffffff}, 0x48) 13:45:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0xfffffffffffffe5e}], 0x2) 13:45:53 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201089f0800028001000000", 0x24) 13:45:53 executing program 2: 13:45:53 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x2}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:53 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x50000, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x80) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000040)=0x2) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x55}, 0x48) 13:45:53 executing program 2: 13:45:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x2000000]}, 0x10) 13:45:54 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201109f0800028001000000", 0x24) 13:45:54 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x2000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) write$FUSE_IOCTL(r0, &(0x7f0000001880)={0x20, 0x0, 0x5, {0x7, 0x4, 0x6, 0x1}}, 0x20) recvmsg$kcm(r0, &(0x7f0000001840)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000080)=""/9, 0x9}, {&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000140)=""/107, 0x6b}, {&(0x7f00000001c0)=""/112, 0x70}, {&(0x7f0000000240)=""/220, 0xdc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/130, 0x82}, {&(0x7f00000015c0)=""/150, 0x96}, {&(0x7f00000016c0)=""/187, 0xbb}], 0x9, &(0x7f0000001400)=""/85, 0x55, 0x39f05b3d}, 0x40000000) 13:45:54 executing program 2: 13:45:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x90ffffff00000000}, 0x48) 13:45:54 executing program 2: 13:45:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa00000000000000}, 0x48) 13:45:54 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x1000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:54 executing program 1: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r2}) r3 = gettid() recvmsg(r0, &(0x7f0000001800)={&(0x7f0000000100)=@can, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/211, 0xd3}, {&(0x7f0000001280)=""/10, 0xa}, {&(0x7f00000012c0)=""/149, 0x95}, {&(0x7f0000001380)=""/210, 0xd2}, {&(0x7f00000015c0)}, {&(0x7f0000001600)=""/39, 0x27}, {&(0x7f0000001640)=""/15, 0xf}], 0x8, &(0x7f0000001740)=""/165, 0xa5, 0x3}, 0x10100) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r4, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:54 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201029f0800028001000000", 0x24) 13:45:54 executing program 2: 13:45:54 executing program 2: 13:45:54 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x100000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xffffffe4}, 0x48) 13:45:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:54 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201039f0800028001000000", 0x24) 13:45:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x9000000]}, 0x10) 13:45:54 executing program 2: 13:45:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) fcntl$getown(r0, 0x9) 13:45:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x10000000000000}, 0x48) 13:45:55 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x200000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:55 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffe, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, 0x0) 13:45:55 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201049f0800028001000000", 0x24) 13:45:55 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0xffffffff00000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000000000)=""/135, 0x87}], 0x2) 13:45:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xffffffff00000000}, 0x48) 13:45:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xa]}, 0x10) 13:45:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x7b) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) 13:45:55 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f5110800010002010f9f0800028001000000", 0x24) 13:45:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x400000000000000}, 0x48) 13:45:55 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x200000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000100)={0xf7, 0x0, 0x9, [], &(0x7f0000000080)=0x8}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x3f}, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) 13:45:55 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0300028001000000", 0x24) 13:45:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x700000000000000}, 0x48) 13:45:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000200)={{}, 'syz0\x00', 0x1b}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f00000000c0)={{0x77359400}, 0x12}, 0x4dc) 13:45:55 executing program 1: readv(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f0000000000)=""/96, 0xb}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) accept4$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10, 0x0) 13:45:55 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x3f000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 2010.733683] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 2010.808174] input: syz0 as /devices/virtual/input/input34 13:45:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x55000000}, 0x48) [ 2010.890128] input: syz0 as /devices/virtual/input/input35 13:45:56 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x2000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:56 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f1000028001000000", 0x24) 13:45:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x6]}, 0x10) 13:45:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x7}, 0x48) 13:45:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$sock_bt(r0, 0x5411, &(0x7f0000000100)="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") readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:56 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getpid() getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x4, 0x80100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000005c0)={r0, 0x78f3}, &(0x7f0000000600)=0x8) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) fremovexattr(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465642e00001c000023000000"]) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000340)={r0, 0x8}, &(0x7f0000000380)=0x8) sendfile(r2, r5, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, &(0x7f0000000040)=0x65) creat(&(0x7f0000000200)='./bus\x00', 0x0) 13:45:56 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x3f000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 2011.537085] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') open_by_handle_at(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="d7000000010000a22fb40048ce6f2b8279cd53e18ab4723548efb5405b9e0ea5efa83d30177e91ab3ced44037c7c1dff931b835e151e02018a3fbe5e4bf29fada0f5ec032c928c2f883547ff981cd86ba9ef5b763463271c8b2616a64a8482af27d571968cf1235b66f1f90de2e4c37a40299e8946b34199aba3344bf682d07ee0b193ce6bd3d4d9b8febf5a940e2dedbde1eb99b76e7378bd2577b317ce1d42ea2c3ab1aee278255cfe82a56fecce3247996ed66340a550601e28af6cc547ea2e13b83dad2554e50311b954c1e8d3d5fe"], 0x20000) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000000000)=""/135, 0x87}], 0x2) 13:45:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x80ffff00000000}, 0x48) 13:45:56 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x20000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:56 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0810028001000000", 0x24) 13:45:56 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x1000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:57 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000340)={@multicast2, @broadcast, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000d40)={'vcan0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockname$packet(r0, &(0x7f0000000e00)={0x11, 0x0, 0x0}, &(0x7f0000000e40)=0x14) getpeername$packet(r0, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000f00)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000001000)=0xe8) getsockname$packet(r0, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000010c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001100)={'irlan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000012c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f00000013c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001600)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000001700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000005200)={0x0, @rand_addr, @remote}, &(0x7f0000005240)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006540)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006580)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000006680)={0x0, @multicast1, @dev}, &(0x7f00000066c0)=0xc) accept$packet(r0, &(0x7f0000006700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000006780)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000006880)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000068c0)={@remote, @empty, 0x0}, &(0x7f0000006900)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006940)={'syzkaller1\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000006980)={@ipv4={[], [], @remote}, 0x0}, &(0x7f00000069c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000007380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000007340)={&(0x7f0000006a00)={0x930, r1, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x188, 0x2, [{0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x7ff, 0x400, 0x6f1, 0x1}, {0x6, 0x7f, 0x0, 0x147d}, {0x4, 0xa61, 0x800, 0x5}, {0x2, 0x6, 0x9, 0xec5}, {0x2, 0x80000001, 0xb43c, 0x81}, {0x1, 0x0, 0xdf, 0x100000000}, {0x8, 0x8, 0x5, 0x9}, {0x67, 0x5, 0x2, 0x8}, {0x2, 0x2, 0xc0, 0x7}, {0x9, 0x6, 0x5, 0x7fff}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xffff, 0x101, 0x9, 0x1}, {0x40, 0x7, 0x1000, 0xf56f}, {0x8, 0x8, 0x40, 0x4}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x1b8, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r9}, {0xcc, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x100000}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xa037, 0x7, 0x3, 0x6}, {0x5d, 0x100000001, 0x8, 0x8}, {0x6, 0x6, 0x7, 0x550d}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x280, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x3, 0x22545e58, 0x0, 0x7fff}, {0x2, 0x2, 0x9, 0x25d}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x10c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3d04}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r21}, {0x154, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4, 0xffffffff7fffffff, 0xafaf, 0x2d9}, {0xffffffffffff0000, 0x7, 0x1a04492c, 0xc000000000000000}, {0x1, 0x80000001, 0x4, 0x7f}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x930}}, 0x20004081) r23 = getpgid(0x0) r24 = syz_open_procfs(r23, &(0x7f0000000300)='net/connector\x00') fgetxattr(r0, &(0x7f0000000080)=@random={'os2.', '/dev/dsp\x00'}, &(0x7f0000000100)=""/27, 0xc) getsockopt$IPT_SO_GET_REVISION_TARGET(r24, 0x0, 0x43, &(0x7f0000000140)={'HL\x00'}, &(0x7f0000000180)=0x1e) readv(r24, &(0x7f0000000040)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) [ 2011.749230] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:45:57 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x100000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 2011.793281] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2011.818616] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 2011.957884] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:45:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x3]}, 0x10) 13:45:57 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0808028001000000", 0x24) 13:45:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:57 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x200000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc000000000000000}, 0x48) 13:45:57 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT]) getpid() getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x4, 0x80100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000005c0)={r0, 0x78f3}, &(0x7f0000000600)=0x8) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={"00001c0000000000001c9e000200", 0x811}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) fremovexattr(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465642e00001c000023000000"]) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000340)={r0, 0x8}, &(0x7f0000000380)=0x8) sendfile(r2, r5, &(0x7f0000d83ff8), 0x800000000024) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, &(0x7f0000000040)=0x65) creat(&(0x7f0000000200)='./bus\x00', 0x0) 13:45:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3) [ 2012.469886] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:57 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0xffffffff00000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:57 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0804028001000000", 0x24) 13:45:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2000000}, 0x48) 13:45:57 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x3f00}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/96, 0xfffffffffffffef0}, {&(0x7f0000001500)=""/135, 0xd8}], 0x2) [ 2012.648789] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 2012.661392] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:45:58 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x2000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:58 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0802028001000000", 0x24) 13:45:58 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x400040) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="b86108c3bc9f0e2c4cc495833f7a4886ddba3f1caa1c41ef7a00d508d38577eeac7760f39273b005ebe8a89409fdb7a4d02924759f68bc192e7371ef8e905d289887", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0x7c, "6e988993c14db2d1844605afd7e1b6aac687a052e8f43492d7c2ddb3951a1c4806b90d5cdacc96c61a5ecc4440b173ec236f8e1aabac77e01f6db01117586cbad9abf11fdafbdf1887cdc36363cc6a536fc421b117cc44ba755af0c93751a9a36afa8aaa16f22dd8f389bd81145701fc498209c8c2b5c812ebcd7fb1"}, &(0x7f0000000280)=0x84) r3 = syz_open_procfs(r0, &(0x7f0000000180)='wchan\x00') ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000000)={'ip6tnl0\x00', 0xfffffffffffffd98}) readv(r3, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xfeffffff00000000]}, 0x10) 13:45:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x10}, 0x48) 13:45:58 executing program 2: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="820200000000ad6859b9731f39c28a8500001ed451c186cd7da499b64a8514d00ff50a0a0f97db599b1bf5a8392942b352bcc8797871d5fc1e2b9ff4da5d766cae88edd6d8d11e581a8a2827cd41f7aba9dfa8c82491d62db367f3987abb5ea1f2965a39660de3ae2b18e938ee855af3320a2bfb8d68e2aede"], 0x1) 13:45:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x200001c8) 13:45:58 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x2}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 2013.380811] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:58 executing program 2: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f05ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:45:58 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0803028001000000", 0x24) 13:45:58 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r2, &(0x7f00000008c0)=[{&(0x7f0000000580)=""/30, 0x32}, {&(0x7f0000000840)=""/107, 0xffffffffffffffcc}, {&(0x7f00000005c0)=""/223, 0xfffffe3f}, {&(0x7f0000000900)=""/238, 0xed}], 0x10000000000001b8) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffa000/0x4000)=nil, 0x3, 0x1, 0x8, &(0x7f0000ffd000/0x1000)=nil, 0x2}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f00000001c0)) 13:45:58 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x3f00000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:58 executing program 5: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b4000000000000009f000000080000000500000000000065f419b33f2294b4e842009500000092a70000b581190f807de775de2d6d97f6430694493cb3e386510182"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x408541, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000280)={0x1, 0x4, {0xfff, 0x7, 0x3016, 0x1, 0x3, 0x3, 0x1, 0x4}}) [ 2013.538848] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') mkdir(0x0, 0x0) 13:45:58 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080f028001000000", 0x24) [ 2013.744556] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 13:45:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x2]}, 0x10) 13:45:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1ff, 0x200) 13:45:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x0) uname(&(0x7f0000000300)=""/4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="b400ff00000000009f007b11b4843e58e700a86c5ca00000000000000500000000000095d92f4a0040000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x7fff}}, 0x8, 0x6, 0x5, 0x0, 0x3}, &(0x7f0000000480)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000004c0)={r2, 0x8}, 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x683, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000200)={0x18, 0x0, 0x1, {0x7}}, 0x18) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="1243b282"], &(0x7f0000000380)=0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000280)={0x0, @speck128}) 13:45:59 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x200000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') mkdir(0x0, 0x0) 13:45:59 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800058001000000", 0x24) 13:45:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') mkdir(0x0, 0x0) 13:45:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') r1 = msgget$private(0x0, 0x300) msgsnd(r1, &(0x7f0000000000)={0x3, "50557b0aeeffe7eff73c79bf7cf29185054eaaa83693c6ab4a2af200e833ee1ed494dad8efa1c282"}, 0x30, 0x800) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:45:59 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x1000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:45:59 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800038001000000", 0x24) 13:45:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x4000) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:45:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000140)={0x5, 0xffffffffffffff79, 0x1000, 0x7, 0x100, 0x1}) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000100)=0x2) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/12, 0x110000, 0x800, 0x800}, 0x18) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000001c0)={0xfffffffffffffe01, 0x300000000000, 0xcd4, 0x2, 0x5}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) fcntl$getown(r0, 0x9) 13:46:00 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x50000]}, 0x10) 13:46:00 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800058001000000", 0x24) 13:46:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x2000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000380)={@loopback, 0x6f, r2}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2e9, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000400)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x1}, 0x48) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) 13:46:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x52, 0x7c, 0x7, {0x100, 0xcc}, {0x3, 0x3}, @cond=[{0x100000000, 0x8, 0x0, 0x0, 0x6, 0x6}, {0x6, 0x8001, 0x5a23, 0x4, 0x400, 0x3}]}) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0xcd6c, 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x8, 0x7}) 13:46:00 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800038001000000", 0x24) 13:46:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:00 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x2000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:00 executing program 1: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000013c0)='autogroup\x00') setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000001380)=@fragment={0x3a, 0x0, 0x4, 0x100000001, 0x0, 0x5, 0x67}, 0x8) readv(r1, &(0x7f0000001300)=[{&(0x7f0000000000)=""/106}, {&(0x7f0000000100)=""/104}, {&(0x7f0000000180)=""/74}, {&(0x7f0000000080)=""/8}, {&(0x7f0000000200)=""/231}, {&(0x7f0000000300)=""/4096}], 0x1000000000000276) 13:46:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) 13:46:00 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028003000000", 0x24) 13:46:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x7000000]}, 0x10) 13:46:01 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x3f00000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009f0000000000000005000000000000009500000000c23b00"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200)=0x1, 0x4) r2 = getpgid(0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000240)=r2) 13:46:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) 13:46:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000000000)=""/135, 0x87}], 0x2) 13:46:01 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280ffff0300", 0x24) 13:46:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5d20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff44d}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000001}, 0x40040) 13:46:01 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028023020000", 0x24) 13:46:01 executing program 1: gettid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) 13:46:01 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0xffffffff00000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={@mcast2, 0x7e, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x5, 0xfffffe31}, 0x48) [ 2016.645961] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! 13:46:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x600]}, 0x10) 13:46:02 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002801fffffff", 0x24) 13:46:02 executing program 1: r0 = dup(0xffffffffffffff9c) write$P9_RRENAME(r0, &(0x7f0000000080)={0x63, 0x15, 0x800000002}, 0x8b82ca07cd32f827) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) 13:46:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:02 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x100000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:02 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000200)=""/193) 13:46:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:02 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x200000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:02 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001080000", 0x24) 13:46:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r1 = geteuid() getgroups(0x5, &(0x7f0000000000)=[0xee01, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) fchown(r0, r1, r2) io_setup(0x8, &(0x7f0000000040)=0x0) io_destroy(r3) 13:46:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_open(&(0x7f0000000000)='selinux/\x00', 0x2, 0x100, &(0x7f0000000200)={0x9, 0x1, 0x100000001, 0x2, 0x5, 0xa6fc, 0x7, 0x80}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x1989fd5c0c9]}, 0x10) 13:46:03 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x3f000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:03 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001004003", 0x24) 13:46:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @remote, @multicast2}, &(0x7f0000000280)=0xc) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000002c0)={@loopback, r2}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="09000000000000009f0000000000000005000000000000009500000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:03 executing program 1: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ptrace$setregs(0xf, r0, 0x4, &(0x7f0000000240)="2cd396e3956d0c013d5e1907da0ab081dee109de456478dc335ecdc403b4fd05a17d5def137c6217d301785df57730670b9072691a7b52fbaf06a44f7be573698da74a47ff369e56b4d797da541f8acb318338f82357ae2ed25a5c716308eaf4abac70a17cc12e0ccb5f3ed377d5159b2a9f541572667332a35338caffc901baafa87019662eca06788b80e22e4b8eb6446d2823e019eefac8fb5b04fdd5e21d42cf5231bfd4bec72a5b07d75c7e0a") getsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000180), &(0x7f00000001c0)=0x4) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x1000000008, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(r0, &(0x7f00000000c0)="6e650100000000000000") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x40000) readv(r3, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:03 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x3f00}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000011c0)={0x0, @dev, @local}, &(0x7f0000001200)=0xc) bind$can_raw(r2, &(0x7f0000001240)={0x1d, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) fremovexattr(r0, &(0x7f00000002c0)=@random={'os2.', '\x00'}) 13:46:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:03 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) socket$unix(0x1, 0x2, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x5, 0x8}) 13:46:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x4002000000000000]}, 0x10) 13:46:04 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x20000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:04 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x80080) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="6e65742f6b636d00080054c21defc4037bfaedf299354e8d70e159579be4987ece6a2083f9f8c0") ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x9, 0x7, 0x40, 0x0, 0x0, [], [], [], 0x80000001, 0x8}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) readahead(r0, 0x3, 0x80000001) 13:46:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:04 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:04 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x1000000000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/screate\x00') ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000000c0)={0x0, @reserved}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x301000, 0x0) 13:46:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/60) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="14a051b8c3c2774d000000050000000000000000000000000000000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, [], r1}, 0x48) 13:46:04 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x200000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) [ 2019.047419] device bridge_slave_1 left promiscuous mode [ 2019.053085] bridge0: port 2(bridge_slave_1) entered disabled state 13:46:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') fgetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000100)=""/183, 0xb7) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000440)={0xf, 0x8, 0xfa00, {r1, 0x1e}}, 0x10) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000480)={0x1, 0x2a}, 0x2) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000080)={r0, 0x100, 0x2, r0}) readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x3b5}, {&(0x7f00000001c0)=""/135, 0x87}], 0x2) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x9, 0x8, 0x2c4, 0x0, 0x8, 0x6, 0x8e, {0x0, @in6={{0xa, 0x4e20, 0xd9, @empty, 0x3ff}}, 0x8, 0x6, 0xbff4, 0x1, 0x6}}, &(0x7f0000000340)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000380)={r3}, 0x8) [ 2019.106981] device bridge_slave_0 left promiscuous mode [ 2019.113727] bridge0: port 1(bridge_slave_0) entered disabled state [ 2019.201033] IPVS: ftp: loaded support on port[0] = 21 [ 2019.272118] team0 (unregistering): Port device team_slave_1 removed [ 2019.286917] team0 (unregistering): Port device team_slave_0 removed [ 2019.298312] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2019.340180] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2019.411630] bond0 (unregistering): Released all slaves 13:46:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xc9c0d59f98010000]}, 0x10) 13:46:04 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280013c9400", 0x24) 13:46:04 executing program 5: socketpair$unix(0x1, 0x9, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:04 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:04 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x800, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0x10001, 0xfffffffffffff1c5, 0x401, 0x5}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) [ 2020.375542] bridge0: port 1(bridge_slave_0) entered blocking state [ 2020.382385] bridge0: port 1(bridge_slave_0) entered disabled state [ 2020.390412] device bridge_slave_0 entered promiscuous mode [ 2020.441844] bridge0: port 2(bridge_slave_1) entered blocking state [ 2020.448842] bridge0: port 2(bridge_slave_1) entered disabled state [ 2020.456809] device bridge_slave_1 entered promiscuous mode [ 2020.505784] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2020.556269] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2020.730933] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2020.780933] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2021.003550] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2021.011142] team0: Port device team_slave_0 added [ 2021.056689] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2021.064091] team0: Port device team_slave_1 added [ 2021.110421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2021.158923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2021.207931] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2021.215138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2021.232141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2021.272757] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2021.280049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2021.288665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2021.652312] bridge0: port 2(bridge_slave_1) entered blocking state [ 2021.658750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2021.665430] bridge0: port 1(bridge_slave_0) entered blocking state [ 2021.671869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2021.680048] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2022.646408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2022.658421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2022.753504] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2022.846938] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2022.853053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2022.860403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2022.952899] 8021q: adding VLAN 0 to HW filter on device team0 13:46:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000500)={0x1, &(0x7f00000003c0)=[{0x2, 0x4, 0x100000001, 0x6}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x40040000003) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000200)="69e39b2f1435c7ec4a771be0c9f2d4f96925e7c639cc4dbee55297aec069dc8ce0472cac85d62370ed562624e771e48c7d431f738e2889a8a41324905d3710b4d84ba73fa1d0395d1a8e02826065fcf529fc247bb3b73b1bab4a9ef157e971c050a8ffe2a9fb5335ac266a53842c804cd00b575c73a86895", &(0x7f0000002000)=""/4096}, 0x18) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f00000000c0)={0x2, 0x1fd}) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000400)={0xf, @capture={0x1000, 0x1, {0x0, 0xffffffffffffffe0}, 0x100000000, 0xfffffffffffffffe}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x57) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000001040)={'vcan0\x00', 0x0}) listen(r1, 0x3) sendmsg$can_raw(r2, &(0x7f0000000380)={&(0x7f0000000100)={0x1d, r3}, 0x10, &(0x7f0000000340)={&(0x7f0000000140)=@can={{0x3, 0x5, 0x2, 0xf}, 0x2, 0x3, 0x0, 0x0, "c660ac7f95c55d43"}, 0x10}, 0x1, 0x0, 0x0, 0x810}, 0x0) socket$unix(0x1, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x20000000000002e6, &(0x7f0000001fd8)=ANY=[@ANYBLOB="67ec1c77dd6a62c16433aeb4000000000000009f000000000000000500000000"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0xc}, 0x48) 13:46:08 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map], {0x95, 0x0, 0x0, 0x2000000}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:08 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010f0000", 0x24) 13:46:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0xffffffffffffffff, 0x4, 0xffffffff80000001, 0xecb1}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) sendto$inet6(r0, &(0x7f0000000200)="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", 0x1000, 0x20000000, &(0x7f0000000000)={0xa, 0x4e24, 0xc13b, @dev={0xfe, 0x80, [], 0xf}, 0x50}, 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0xfffffffffffff801, @loopback, 0xd01a}, @in6={0xa, 0x4e21, 0xffffffff00000000, @empty, 0x7ff}, @in6={0xa, 0x4e24, 0x7f, @local, 0x20}, @in6={0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x11}, 0x7}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in6={0xa, 0x4e20, 0x2, @empty, 0x6}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e20, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x401}, @in={0x2, 0x4e22, @empty}], 0xd8) 13:46:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x700000000000000]}, 0x10) 13:46:08 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:08 executing program 1: mlockall(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) capset(&(0x7f0000000080)={0x399f1736, r1}, &(0x7f0000000100)={0xb3, 0x6, 0x6, 0x5, 0xc7, 0x8000}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1000, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) fsync(r2) 13:46:08 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000200)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:09 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:09 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)="73797a6b616c6c657202", 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x40100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x8, &(0x7f0000000240)=@raw=[@map={0x18, 0xf, 0x1, 0x0, r1}, @alu={0x4, 0x101, 0x8, 0x8, 0xf, 0x0, 0xffffffffffffffff}, @exit, @map={0x18, 0x0, 0x1, 0x0, r2}, @jmp={0x5, 0x3, 0xf, 0x2, 0x7, 0x50}, @ldst={0x0, 0x3, 0x2, 0x1, 0xf, 0x118, 0x18}], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xb, 0x100000001, 0x80000000, 0x4, 0x32, 0xffffffffffffff9c, 0x80000000}, 0x2c) 13:46:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x259}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:09 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000f00", 0x24) 13:46:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x1000000]}, 0x10) 13:46:09 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) stat(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x81) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={0x0, 0xfff}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000280)={r2, 0x81, 0x8}, 0x8) 13:46:09 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001008100", 0x24) 13:46:09 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)='net/kcm\x00\b\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000440)="6e65742f6b636d4a46beb3b1940090fef7d6503decc017190d8d13f3beb3e306bb79a3c48781bcbf71889b0000000000007c786cca5babf11bb1cdfe84955134bac5f91f1ce9efcf1faf63ee4176def00ab5c37998e7b9c3297c0712b697dbf1c41348027ae3a6b9617a1bfe6449f0d0ddd430e6ac114f932dff97364608fcc63f2ccb62fe310e30305ecdcedf5d3427ccf253f3da8316136f9313b271bf157b262a6f0bdfdf6ce63395d6e57430f1a4cac96964c8e6e28caf51f7c36ee582b476cb5e327a920f5e70df0ca824229b8cd9ce6473867f3e59c3a9") readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:09 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000780)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000280)=@nat={'nat\x00', 0x1b, 0x5, 0x4a0, 0x338, 0x130, 0x130, 0x0, 0x0, 0x408, 0x408, 0x408, 0x408, 0x408, 0x5, &(0x7f0000000200), {[{{@uncond, 0x0, 0xf8, 0x130, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@set={0x40, 'set\x00', 0x0, {{0x2e2, [0x5a, 0x0, 0x0, 0x7fff, 0x7, 0x8], 0x3, 0xc9b, 0x1}}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @local, @loopback, @port=0x4e24, @icmp_id=0x67}}}}, {{@ip={@loopback, @multicast2, 0xffffffff, 0x0, 'bond_slave_0\x00', 'bond_slave_1\x00', {}, {0xff}, 0x2, 0x1, 0x2}, 0x0, 0x100, 0x138, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xb, 0x2, 0xffff, 0x7}}, @common=@set={0x40, 'set\x00', 0x0, {{0x5d3a, [0x3, 0xf0e, 0x101, 0x7, 0x1000, 0x2], 0x7fff, 0xffffffffffffb07b, 0x1}}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @loopback, @local, @port=0x4e21, @port=0x4e23}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @local, @dev={0xac, 0x14, 0x14, 0x20}, @gre_key, @gre_key=0x1}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x7, @multicast2, @rand_addr=0x401, @icmp_id=0x65, @icmp_id=0x65}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:09 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001003f00", 0x24) 13:46:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="6e65742f6b636d00f4088c071476bb9efa3b3c51de784ae35bbc9ce95d16c43ead3264636b67006a1127f8481f03f3349b243c3a86a0a676ab1af46f79d26e44bcd1d9f03ea7185299e8c9039c54fb326bb5e0ff3def2a9dd4525404b939f85f24468aa327636912ccaae9a4d801d7cdc95b935eb39e55be2cef39b45f896df45866c6d0f0de813b4665a3efb14d63e9099639de9763cc2d04caa3f0b52d77d32d4d2640e49dde4683442d0dd16c81c92ff38d747258fec0f8f4be13512ede6986d0467456") ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xff0f0000]}, 0x10) 13:46:10 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x800) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x9}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000280)=ANY=[@ANYRES32=r2, @ANYBLOB="00c7f3c4"], &(0x7f00000002c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x97, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xfffffffffffffffe}, 0x48) 13:46:10 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100f0ff", 0x24) 13:46:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:10 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:10 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:10 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20400, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @rand_addr=0x4}, 0x0, 0x8, 0x1ff, 0x51, 0x5, &(0x7f00000002c0)='lo\x00', 0x80, 0x5, 0xf6f}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b4000000000000009f0000000000000005000020000000009500000000000000fd28f5c59456dbe65cacfb7915796f2b6f94de4d78989fcd2d2baa63a3efcfd4457c7cb56a93f68c719fb0e356a2f79555f959f8f0140d247a55e10af53be3d8dc5c866b83093289aa5b20363bef8a1725cd3d88ac1b6dbd48befff9b1914b86ed4ab6df221888148bd4e66db0c927753f22"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000380)={0x2, 0x0, [{0xaff, 0x0, 0x2100}, {0x23f, 0x0, 0x8220000000}]}) 13:46:10 executing program 1: r0 = getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) r1 = syz_open_procfs(r0, &(0x7f0000000240)='net/packet\x00') readv(r1, &(0x7f0000000000)=[{&(0x7f0000001480)=""/96, 0xade8aa6be4ddae50}, {&(0x7f0000000100)=""/135, 0xb2a2528cafb2f1f4}], 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080)=0x4, 0x4) 13:46:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x129b9b68]}, 0x10) 13:46:11 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:11 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001ffffff", 0x24) 13:46:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0xfffffffffffffe00, 0x20000) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000280)={0x100000000, "92ce20da8842548dde152754003815201970d666d86550e8d956a264d6f968b5", 0x3, 0x1004, 0x3, 0x800000000, 0x6, 0x2, 0x1, 0xffffffffffffff7f}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) 13:46:11 executing program 1: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000200)={0x6, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:11 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:11 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x74, r1, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x78}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x965}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x23}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x200}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x74}, 0x1, 0x0, 0x0, 0x4004010}, 0x4000) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/kcm\x00\b\x00') readv(r3, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:11 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:11 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x20800000000003) [ 2026.631413] Unknown ioctl 1074275332 [ 2026.653700] Unknown ioctl 1074275332 13:46:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0xffffffffffffff19) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:12 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:12 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x7ffffffff000]}, 0x10) 13:46:12 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x3ff, 0x8000) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x1840, 0x3) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r2 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="83f62125abf5deed12aa899640e74e8c86224f293aee9705fe439a991f5cb03e9a31d96cf651a7de5d379290d627aa3d47", 0x31, 0x0) keyctl$get_security(0x11, r2, &(0x7f0000000100)=""/86, 0x56) 13:46:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:12 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x4, 0x805, 0x60) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f0000000200)=0x8) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r2, 0x3ff}, &(0x7f0000000280)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:12 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x101000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) bind$packet(r0, &(0x7f0000000080)={0x11, 0x8, r1, 0x1, 0x9, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') fadvise64(r2, 0x0, 0x3, 0x5) readv(r2, &(0x7f0000001680)=[{&(0x7f0000000100)=""/96, 0x60}, {&(0x7f0000000340)=""/135, 0x87}], 0x2) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000400), &(0x7f0000000440)=0x10) r3 = semget(0x2, 0x3, 0x40) semctl$GETVAL(r3, 0x7, 0xc, &(0x7f0000000280)=""/170) 13:46:12 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001f00000", 0x24) 13:46:12 executing program 2: setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:12 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:12 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001100000", 0x24) 13:46:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e01742f6b636d00000061b81956690eda738df76a27d7aace7d41bb1d2e7e33259a323054c32008881172effd68af032dcda13e11071000e6b32f0dd93d45c65d2134204f2dc2ac08f03a98ef883a13bf53dddea462ad30fe87829cbe2dda118df5a4e1c1d766b6ed28e0633ee9548463229af7567e561fd0f95264a564d53816914ada8b45fb61ae0f1c78f6e2e2cc14948fe2d749cdf69ca346d08d70cb0c3264b84d9d55fdd39de15abb43f5a4a446e0475287ee1badd29e269d01e580e02b9963cc42275c782e1d1649fc8fd07123f0450f62180128f6a7874b00bc3ae37c882ab9f3635914f949") readv(r0, &(0x7f0000000000)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x3, 0x3, 0xcb3, 0x40, 0xb5, 0x8, 0x9, {0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0xcebf}}, 0x1, 0x4ce, 0x1f, 0x7}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x7f, 0x204, 0xffffffff, 0x101, r1}, 0x10) 13:46:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x600000000000000]}, 0x10) 13:46:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x20000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:13 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:13 executing program 2: setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:13 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280019effff", 0x24) 13:46:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f000000b8c0)={0x5, 0x10000000001, 'client1\x00', 0x2000000001, "a184992cdf3e5169", "970cf518a92b61a52e000000b210b2566af78b1f44116f6400ef2fd70514eb83", 0x6, 0x55}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000010e00)={'bond_slave_0\x00', 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f000000bdc0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000be00)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f000000bf00)=0xe8) stat(&(0x7f000000bf40)='./file0\x00', &(0x7f000000bf80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000c000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f000000c100)=0xe8) r7 = getegid() r8 = getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000c140)={{{@in6, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f000000c240)=0xe8) r10 = getegid() fcntl$getownex(r0, 0x10, &(0x7f000000c280)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000c2c0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f000000c3c0)=0xe8) getgroups(0x9, &(0x7f000000c400)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee01, 0xee00, 0xee01, 0x0]) r14 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f000000c440)={0x0, 0x0}, &(0x7f000000c480)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f000000c4c0)={0x0, 0x0, 0x0}, &(0x7f000000c500)=0xc) r17 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f000000cc00)={0x0, 0x0}, &(0x7f000000cc40)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f000000cc80)={0x0, 0x0, 0x0}, &(0x7f000000ccc0)=0xc) r20 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f000000cd00)={0x0, 0x0}, &(0x7f000000cd40)=0xc) getgroups(0x6, &(0x7f000000cd80)=[0xee00, 0xee00, 0xffffffffffffffff, 0xee00, 0x0, 0xee01]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f000000ce00)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f000000cdc0)='client1\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f000000ce40)='./file0\x00', &(0x7f000000ce80)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f000000cf00)='./file0\x00', &(0x7f000000cf40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f000000da80)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000dac0)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000dbc0)=0xe8) r28 = getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f000000dc00)=0x0) lstat(&(0x7f000000dc40)='./file0\x00', &(0x7f000000dc80)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f000000dd00), &(0x7f000000dd40), &(0x7f000000dd80)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f000000ddc0)=0x0) fstat(r0, &(0x7f000000de00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f000000de80)='./file0\x00', &(0x7f000000dec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f000000f480)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000f4c0)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f000000f5c0)=0xe8) r37 = getgid() r38 = getpid() fstat(r0, &(0x7f000000f600)={0x0, 0x0, 0x0, 0x0, 0x0}) r40 = getegid() sendmmsg$unix(r0, &(0x7f000000f700)=[{&(0x7f000000ba40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f000000bd80)=[{&(0x7f000000bac0)="ae3b7e010fbbcd35971d4303f96cea6ad4a257d3d4910661e02aed2b6fba06b8117977dff4e554b475ea624ad0e2277f9b133a6afe4c5fe9b847657c5ea3ade79bb7ff9b5277ec520b3fec277273c847d0419d623d2534e4c6c0a25841f370e49a3bdd96e25b370dc76b35549c518599586040f6270a8c0c4ce9bcb964e1e7483fe3c2b16be96583badb2d651a18c8293c645bbd0e6650438604b18898edb173070e51dfd54bbef93c74042c9817ec16fa41eb50", 0xb4}, {&(0x7f000000bb80)="d0bd926f233a2385cc2e232850237b8de275bed9e3ff35eeaea1565becb49534820190a234e61801cbaabe3995e5b37d4a6fe979bd69522c4dec085d5df53a0922fd165d3845b70ccc4d9f11a5a762f816bd77835d01c12fe73082fe610b4dcd384121919743db6320e1a03d0e09fa7810a46f5ece685ad306515193b3ff578421a2d2ccead2dad7baa200b9113118f1edac5e367aeb157b862a5798119ce69903b369be2a0a08ae9bc59e263e433cb810c8999ebe9034130d83c0a37b34d8eb81ebbac2", 0xc4}, {&(0x7f000000bc80)="593741704ca38e3d664b5ecb7c56dd442038b1976b504878de7d2ce63dd36a101836dc4c16b12805f2708898741689881d88791bfad49476e8586b82470afb64bc4afcbbe70e520a90c362e4c8f2c9917cb2973921ceef08ef86fcb916c10b1ce6fb75a08fbcb613a350856cead0107d7efdf8617c30be1b245ab3ad3bd257591e012d39d236032bffdb221e980f73a09f45d58185bc783dd4d8e6917877e9a983fc4ad8d97e821065dfa02b268a35d6da646de7847bd5622a11e0b7f71468ed56818e29eec7c615ada783f5ca8895bdc6a106b6c0b69d5a38bbef637c5b34", 0xdf}], 0x3, &(0x7f000000c540)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0x128, 0x8000}, {&(0x7f000000c680)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000cb80)=[{&(0x7f000000c700)="761aae9fefe5a92f333838d76cef6001f5038d0c62e1dbd47dc93e34f07511551388c1cfa461387d537b4419b8f5ce1d879eb7f2918f6cb153cfe981ea1d", 0x3e}, {&(0x7f000000c740)="67d2e6b41c4e6f6a86d756c3b4b73f84f7e0404d7e2a75a928767c71f3e98a5302aa330596d1b8909ffd8841f109216f778385a31677dec2c94d7e0adb4a6aa1061ed6c764d580e316c2d538a68e6cd52a26dc9eee8b5ea237840a64afac04078accc1b1278d1c03ac80809493d4cdc4e3637aa1b70718d3", 0x78}, {&(0x7f000000c7c0)="8a213499e69fd83b8452ac5f46362cccba8596687c5b228a0e02ab5ac856efa1b0dee85e96c6d4d4a5ed6d5787aceaa926a0613dd2853e8d745a794288793ec3856e5f843ba7f601de1f5a3afb00adec1abfcd2b6765e175b59c8c2d24fdc0ce95339166b8b5b92b679b9dca37f924", 0x6f}, {&(0x7f000000c840)="9ed3fd6c2f8e39c0925a73c033db0e2b780b3bfa99883b3028a76717dd6217d7438deb18ff336f417dbabd6f19effc22a902bb5f42d02f749dbc39f2036f079cafd83b86c07368d0808ed19e4f45bb99da819b1ecc5ae18ccfa709b37f587777930dc254e24ea34b139a21baf91d5536ba39a887393fbbb5cb377e416558bb3d6a425df21884153dd1ef4621dd5953dab6349e21808681f7e15c4fc8dcd2327ca740e328f054b899b37b17200a16102a9ed98006ee80520abf1a", 0xba}, {&(0x7f000000c900)="229b1dac515c686f0cdbc5380417fc2497827ec4b4e49714524407c0e986e786e1fa27f2812bb81124", 0x29}, {&(0x7f000000c940)="55947061148155025617ef48e345ed464a0d520d00711e48d27e141dd2c1d890d03df77741d632b54b9308d02429dc1de50e0170c7d6257f9a8667768ed195733141eb4545aeb415baa89ab8ef191970b1f2f64786df5d239f05496ca5b20a491a867726f4e419f2c261fc5665d4a14dd40915b7083a89b6621f53105ee94e3e2276f23569767e680c74953b976af1bb7d21f811bdd20d753e3189c786bee52b7460f4bdd64ca4c8be4408261d1be6f5618e44a91f4b5dfc26", 0xb9}, {&(0x7f000000ca00)="249df8d6a4259d47e7ae7ce6494701ffb8b88d199791d9f543bc9f977403a6e38d6ede69625271148ed14721b4dc2829203468e23bb0977cb92a564b89984711b50a4c2094429a5710032fc0d92103f3967701ea008bc13d1c9a18bd7fb2397956e5f0480ea0fdf4bedf597ddf9852e9c3c02f30187d27a19de2377088d1d295457fa21fa55e4cc5f63535a9bb427c6954ae2bd06f31efd85f047cdf7d1f890f6d8ca54695afb3", 0xa7}, {&(0x7f000000cac0)="70c3dc55bf74d3404fd58013aaea66ae83edf02e918b8f2567fcc1953df1c633b295f25cb9db4c8e12f6a53a53544d41b90c542474c8aad8e8ab78ed3be80ddf7c0f309e7459f7fb5ba264666364c573fb7d0344057b8fed9c74c700de8964b826de9845787b88b06c9fdf58a4f5be5f418aa99d2950a204cc283b528bf74b7976d940fb3de59e423915e7a4b7c9cfcc3c8a7fa6f4ac3f5e0558295c8ef1d094e18be9ab19ce93aceba86f5c1f6c898caa70a3021158ab2f2a7c", 0xba}], 0x8, &(0x7f000000cfc0)=[@cred={0x20, 0x1, 0x2, r17, r18, r19}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r23, r24, r25}], 0xb8, 0x80}, {&(0x7f000000d080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d4c0)=[{&(0x7f000000d100)="d7ef8f16d18d0e6b3dc84dff3ed9c1ba93bf4a49336348ca58eeb50ac9c3c3a3846ead76dc618e157394face88cc12c8265367e76d06ae3c2d9108370a523d6b8b8390ce0da3061b0573f3b7a501ca113949c10edb16da93eddeacf5e4692e27aac9085da6", 0x65}, {&(0x7f000000d180)="d7fd4087027128932e6b34e3de915be97b6630849c319a2e266dd4ce3fe3f530efde02d8d867e918beca680c261daf9e727287852fe6be5346a3e29150dc7b939079e1da94db365264dce99d3a1a28cef90aeca0538e4535578be8ac5688fc3afd956d9098c328f6d8b37175266adf9e7fe1d4923efe4bf0870ade485234117b382ee070d4eedd5a5bd7c589d3c7f406cdcc56ed6f8b2a90b72dfd06bbcd7f19778361e5b7c7a26577cd95ca6a26da4f244a1c727307839aa33f3837841c702846681f537f23babfff27d313da40270111f0973fd3045c00649b1b68c5f76b66630c294db086dbedd82b62e8730262665c", 0xf1}, {&(0x7f000000d280)="e1f5a4cfdd6184139ad361530ac61ea832ca087060c0b1ac146ffb252d617de77caeb0869986949172d062f0cb0650db9d6ac4471acedd30edac6d82db608204ea311318433bcc88a3fe6bf6d663b00d26e9b21ef851d8fa5b706b57203c5229e2f3a0bf4b9723fe3ff93e4475e65e0c8578689274e230759184481a62b56ae1e33a80085e591951082ac494a552d841fa", 0x91}, {&(0x7f000000d340)="c3775dc605076b0c7e7a70d1e36624892b7cea3d14c0898d6b9c4d4fed253f96d30438c00cc0956bccc59ebbb9ff748568ba05264a0329dca698fe0a4fd8e947e33cdea76c46e4da2b627d995e982fbc03744fafa032890567cfcf97d93e548d3bd519f721acbc59d6ec0b14a387ebb2dd67423475826ea02eaa8f5a6aa3b0388e27abb876e39dba42bfd1e76bf66d8ddf0e368d0ea2856fb9283006b38f77d6da006d029720", 0xa6}, {&(0x7f000000d400)="d33e5b2ddbd550caaa9dead4f4c772f6cf182706b5424c61054aa89e7d9158d48359947754105ce801ae7f26b461435560c4559b0a86ce2a807b02909be3b9aba56bfb3e20a68e0049b1705987b538f8648d4248cc533fd2c6663f6eb7c836062cd80827b8fe994aa508aea2809bfc85605505ad19b98866151925583c8e829758", 0x81}], 0x5, &(0x7f000000d540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0x48, 0x800}, {&(0x7f000000d5c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f000000da00)=[{&(0x7f000000d640)="93c9fe2377943957d2bebc3e2204ce0cba38dcd5c5a0c533dc38d2c2db46ed62807232ac5a50d293ea4a1d0362ee3d5378c65f30d4e70be3226113500a26b56db4b22110ce35a497605067040a0f8fdb72f56932fa0287709daa20efe108c9ad7c2d9211ed375b24021360f91caa8420aee619e47b00d19b1ef22c8b5e7fc5711d9aaec3ef22da8fa4d2", 0x8a}, {&(0x7f000000d700)="4b912055", 0x4}, {&(0x7f000000d740)="d2f38baec0fb8009650367c15dde799f1dc60990987a6978745be5967a9e4f093dd9ad9f9ab639fef1dad7f7ea23a0641e0ed7bb39d88937f84dd905208a14591e97810469f665c21946c5cf795231421391235c476a1b3871ffe955a6512b385755bd46fb96bd25e85c418ce8af888a38478a409678ddb6b8acc61f077e0612e30022a4f31f0da963629aa111f2f9e9955a0b92f87bf38bc250cb551d86997caf832d782be8556ddb4b362090566ecb76b8c137459ffb72e939e2b9e10462c243583b0c662fe841425f9dcbb18bed8adeb65c5e5ca8bfc476cdbba615be6108935bd789cf926eca9ccce313475a", 0xee}, {&(0x7f000000d840)="18ba135bf0d99882cc0da47f5328bc65749293b8d5d8fbd07b226b21c2c2a90fdf830c81fe56aee43b54326bfbc84e93e5390060b0a26f2eb6a8479cc446ee87cf318123f34bb1520137c0f899a2c71980512c1bfd2d24427f1c03859c8da5f401512caad4f2a3e3c0d4c6182ac38bc9c8c91cc1d5ad6405c43fbb1b0c9199ef208cc473d39ee4dee6f58c31f15d2a0bd34410a0ec7e8ad071352c3520a35f4f7283bafd30c0ebdcbef9bc5ec28141f290ed0bcc4db3726cb89c042f4db32aa6502debf456255e08", 0xc8}, {&(0x7f000000d940)="e215874a4938d5ca4318f183aedcc47682df27d9577caf0dca236e0a45106b58038d61b22aa4e939962e6a9b0a64303c18486abb5865eec1d4ec95d0b8da1f5bd9a68b7277d3fbdc756e40e4be3839c157a164f6f10a0bf2e41fd9e30b5f5694618af5bcac975020b7a2ee38b7ade9d05ffe0cb686ef093b13c0aabe1ab2d6572db5a9c2ee586b", 0x87}], 0x5, &(0x7f000000df40)=[@cred={0x20, 0x1, 0x2, r26, r27, r28}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @cred={0x20, 0x1, 0x2, r32, r33, r34}], 0x80, 0x8000}, {&(0x7f000000dfc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f000000f400)=[{&(0x7f000000e040)="63972981b17c0eba4a30a4376ba0bf92d3796c4220cfa93074fbcbf489f20ada7a21a32dd8cdd26ce0b27d4afc76f70c3637e2b489ba2debd5b94dc3b1c41a3f85de1aaa2a5a701beffbb0b14872012b380b417c71e02a1ea0f11bc6b964a74f2d167222cc601b42a82a07204e14d37308f5acc8766664057353ff8fc0069f11", 0x80}, {&(0x7f000000e0c0)="cd818b478bfdc51eb1cb4571daa96bc7404ee802763ebdf2a88263c2067c87c8ccd85e0ead933fc03485409b3f1c8d32107ed9c193fa7cec2d6de15dc58ad3b912399a7cd86832f77fa1599d9fa51ee41ac65e2591f676d77953996ffc8b0faa7a164e66f6f5adfdf244ef6fc447fc21c1a305d69a0668a59dd21bcd5d9c33ae0a234c8be9b111294ee8f4752a0d270bfc1f965bf5b0d761969496ab93d6e41a58c0aa9f1b65a130ec97e9417d5e351ed3eec3aa90659c113fcc3e6887fa42042f67fc27e587dae99b76dc6a6b6c71d270d0896214d776dec5", 0xd9}, {&(0x7f000000e1c0)="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", 0x1000}, {&(0x7f000000f1c0)="f9a66d7c3dc9d9a9376901e5545b287abb0cb454a61a1cbc79839d0f89972f5da17f1fa140897225ded3787cac84d58200e4d4a08a9d28ee68fd3fb026c30ce97c6f990f13f53b20a8c820c44d040138c1f470b3880fdce2276ed787b9bcf86f214305c2018eba8418c2435e9678b734672e8406c4aec70223df29eeb1fe2eadfabfecc1db366ece1b0b178f3b91c5", 0x8f}, {&(0x7f000000f280)="9194fd5f76cd9bfc79bd355c8c963eded9a0416fe31ba087bd03538359ffb8981010ba4f2b04b58b7ff664d6f6cf45af631f4651b8697a45fecdd919fbff0461cabae09ac31d42cf1e5de4e1da9591f8d982413063a8d48555e3eef40b8eff8d5731ca0c16b722410c594c8d9bc132ed78eddd6cdf2a9fb830d1837c38296f0f61348488d3c440bdc01b0877a8e8dfaa81bf4ae3ccdc7b7bbf9f6e3c6c3ab8416070e92f39e1c60294e1d2df752fe922c02f4e61c1fa1573822db2ca22d8bc89b8d655b08a", 0xc5}, {&(0x7f000000f380)="1be9dafc54ea9225e34b171ca83748adfb1a6b134cfa14a36b358e0469dd11a8c63b583c3d9b5f4bd7a8fb108490dbd77880273f9a8f4d512d9644a6a3155e0d0923849f8d0457946e9a40b42b9c118181b08dafb89b", 0x56}], 0x6, &(0x7f000000f840)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000012000000", @ANYRES32=r35, @ANYRES32=r36, @ANYRES32=r37, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r38, @ANYRES32=r39, @ANYRES32=r40, @ANYBLOB="00002f45cefdbfa2f83d40feb30000"], 0x60, 0x4040000}], 0x5, 0x4000000) getgroups(0x6, &(0x7f000000b800)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee01]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f000000b840)={0x0, 0x0, 0x0}, &(0x7f000000b880)=0xc) getresgid(&(0x7f000000b980)=0x0, &(0x7f000000b9c0), &(0x7f000000ba00)) setresgid(r41, r42, r43) setsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000010e40)={@loopback, r1}, 0x14) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000005e40)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) recvmmsg(r0, &(0x7f000000b500)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/148, 0x94}, {&(0x7f00000011c0)=""/142, 0x8e}, {&(0x7f0000001280)=""/111, 0x6f}, {&(0x7f0000001300)=""/222, 0xde}, {&(0x7f0000001400)=""/114, 0x72}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/81, 0x51}], 0x8, &(0x7f0000002740)=""/145, 0x91, 0x2}, 0x9}, {{0x0, 0x0, &(0x7f0000003b80)=[{&(0x7f0000002800)=""/153, 0x99}, {&(0x7f00000028c0)=""/228, 0xe4}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000029c0)=""/218, 0xda}, {&(0x7f0000002ac0)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/174, 0xae}], 0x6, &(0x7f0000003c00)=""/223, 0xdf, 0x7ff}, 0x8}, {{&(0x7f0000003d00)=@l2, 0x80, &(0x7f0000001640)=[{&(0x7f0000003d80)=""/4096, 0x1000}, {&(0x7f0000004d80)=""/4096, 0x1000}, {&(0x7f0000005d80)=""/130, 0x82}], 0x3, 0x0, 0x0, 0x8000}, 0x2}, {{0x0, 0x0, &(0x7f0000007240)=[{&(0x7f0000005e40)}, {&(0x7f0000005e80)=""/132, 0x84}, {&(0x7f0000005f40)=""/242, 0xf2}, {&(0x7f0000006040)=""/69, 0x45}, {&(0x7f00000060c0)=""/11, 0xb}, {&(0x7f0000006100)=""/153, 0x99}, {&(0x7f00000061c0)=""/38, 0x26}, {&(0x7f0000006200)=""/4096, 0x1000}, {&(0x7f0000007200)=""/14, 0xe}], 0x9, &(0x7f0000007300)=""/92, 0x5c}, 0xffffffffffffffff}, {{&(0x7f0000007380), 0x80, &(0x7f0000007480)=[{&(0x7f0000007400)=""/66, 0x42}], 0x1, 0x0, 0x0, 0x100000000}, 0x4}, {{&(0x7f00000074c0)=@alg, 0x80, &(0x7f0000007740)=[{&(0x7f0000007540)=""/222, 0xde}, {&(0x7f0000007640)=""/74, 0x4a}, {&(0x7f00000076c0)=""/10, 0xa}, {&(0x7f0000007700)=""/23, 0x17}], 0x4, &(0x7f0000007780)=""/10, 0xa, 0x3}, 0x1}, {{&(0x7f00000077c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000007a40)=[{&(0x7f0000007840)=""/132, 0x84}, {&(0x7f0000007900)=""/155, 0x9b}, {&(0x7f00000079c0)=""/98, 0x62}], 0x3, 0x0, 0x0, 0x4}}, {{&(0x7f0000007a80)=@generic, 0x80, &(0x7f0000009dc0)=[{&(0x7f0000007b00)=""/59, 0x3b}, {&(0x7f0000007b40)=""/170, 0xaa}, {&(0x7f0000007c00)=""/4096, 0x1000}, {&(0x7f0000008c00)=""/164, 0xa4}, {&(0x7f0000008cc0)=""/4096, 0x1000}, {&(0x7f0000009cc0)=""/208, 0xd0}], 0x6, &(0x7f0000009e40)=""/240, 0xf0, 0x1f}, 0x3ff}, {{&(0x7f0000009f40)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a200)=[{&(0x7f0000009fc0)=""/161, 0xa1}, {&(0x7f000000a080)=""/122, 0x7a}, {&(0x7f000000a100)=""/59, 0x3b}, {&(0x7f000000a140)=""/146, 0x92}], 0x4, &(0x7f000000a240)=""/199, 0xc7, 0x5}, 0x8000}, {{&(0x7f000000a340)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f000000b440)=[{&(0x7f000000a3c0)=""/39, 0x27}, {&(0x7f000000a400)=""/16, 0x10}, {&(0x7f000000a440)=""/4096, 0x1000}], 0x3, &(0x7f000000b480)=""/82, 0x52, 0xff}, 0x8000}], 0xa, 0x2002, &(0x7f000000b780)) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f000000b7c0)={@dev={0xfe, 0x80, [], 0x20}, r44}, 0x14) 13:46:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_proto_private(r0, 0x89e9, &(0x7f0000000380)="8a7397f8d5351725a4753198d2be70624466232210ec056d32ff23bc1cf1d1357b4a6cdd06e9c5ac2f2137ba66337139fc94ba240c876f7b15dca5a062702163bfac23125368614ea2bd803d824168e3945d20cde960b27d0babb069d11bd29a1559a790e6c6f74de9c8b239213e9d99bee4d240fd3fa87155d862b29ad2f6cfcd90b4c49ab99bd02a8a652e0cd50316c0f3d08815a475ab2d0a611f26ad98f2f0d65504351bb4c63ebf293080ef97cde01821674844fbc7a39995bb44e5c94f2872dd3302f455bcde993dcf") ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2080, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000200)="8261517bca5805c63643247100543c00c5dc70533c6c552c370a9fd3d3de187c929cc888768fc36f068d968e959fd29bd0ffdb82397b697f046d204e72bef748689878d8266847d96f696563c77c269ae0992976672e3ac8d1e156118dcaf9ed0e29a87a5748a4c514194048af5272e4379c210a2d82a3b062a2499578b27b8eebdec345f78bde83687a9e309fce3c253f603801ebb795b2410badb26ca6d5e69cb923cb42b0f966dd2634185d4c4ccdeadc0e23c63c4a63d3e0c07ee404000ff2a1586cbea2716289851841b1", 0xcd, 0x40, &(0x7f0000000340)={0x11, 0x8, r3, 0x1, 0x549, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x1, &(0x7f0000000480)=@raw=[@jmp={0x5, 0x9d8d, 0x0, 0xb, 0x6, 0x20, 0x8}], &(0x7f00000005c0)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x200, [], r3}, 0x36) 13:46:13 executing program 2: setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:13 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680), 0x2a8) 13:46:13 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b4000000000000009f000000000000000500000000000000950000000000000049839bb1d8cc0f5d26f06a4869a059ac72de5765b2d81f9d403915221e60f3074609ed3d68b017bf7149b3b8b74341eed4dad2700e9adb3617e323334c7a20d2510df41cb61551819bc873cf6ce05c66f9402f72c86a9d8f8f46d33404502ff785"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='security\x00', 0xffffffffffffffff}, 0x30) ptrace$getenv(0x4201, r1, 0xa72, &(0x7f0000000240)) 13:46:14 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x20000, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:14 executing program 1: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setfsuid(r0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) connect$pptp(r1, &(0x7f0000000140)={0x18, 0x2, {0x2, @rand_addr=0xffffffffffffcbb6}}, 0x1e) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x240]}, 0x10) 13:46:14 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x1000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:14 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f00000037c0)={@rand_addr, @empty, 0x0}, &(0x7f0000003800)=0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000003840)={@mcast2, @loopback, @empty, 0x0, 0x9ae8, 0x2, 0x400, 0x10001, 0x80102, r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009f00000000000000050000009500000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x169, 0x0, 0x400000000000}, 0x48) r3 = syz_open_dev$midi(&(0x7f00000036c0)='/dev/midi#\x00', 0x0, 0x200000) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000003700)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000003740)={0x7, r4, 0x1}) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/130, 0x82}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/76, 0x4c}, {&(0x7f00000013c0)=""/155, 0x9b}, {&(0x7f0000001480)=""/237, 0xed}, {&(0x7f0000001580)=""/83, 0x53}, {&(0x7f0000000000)=""/11, 0xb}], 0x7, &(0x7f0000001680)=""/180, 0xb4, 0x9}, 0x44a21af0}, {{&(0x7f0000001740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001d80)=[{&(0x7f00000017c0)=""/230, 0xe6}, {&(0x7f00000018c0)=""/102, 0x66}, {&(0x7f0000001940)=""/70, 0x46}, {&(0x7f00000019c0)=""/171, 0xab}, {&(0x7f0000001a80)=""/246, 0xf6}, {&(0x7f0000001b80)=""/167, 0xa7}, {&(0x7f0000001c40)=""/237, 0xed}, {&(0x7f0000001d40)=""/16, 0x10}], 0x8, &(0x7f0000001e00)=""/123, 0x7b}}, {{&(0x7f0000001e80)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000003100)=[{&(0x7f0000001f00)=""/33, 0x21}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000001f40)=""/42, 0x2a}, {&(0x7f0000001f80)=""/32, 0x20}, {&(0x7f0000003000)=""/105, 0x69}, {&(0x7f0000003080)=""/10, 0xa}, {&(0x7f00000030c0)=""/45, 0x2d}], 0x7, &(0x7f0000003180)=""/85, 0x55, 0x200}, 0x1}, {{0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f0000003200)=""/115, 0x73}, {&(0x7f0000003280)=""/58, 0x3a}], 0x2, &(0x7f0000003300)=""/140, 0x8c}, 0xfffffffeffffffff}, {{&(0x7f00000033c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003480)=[{&(0x7f0000003440)=""/60, 0x3c}], 0x1, &(0x7f00000034c0)=""/98, 0x62, 0xaa}, 0x1f}], 0x5, 0x40000002, &(0x7f0000003680)={0x0, 0x989680}) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000003780)) 13:46:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000000080), 0x33c) 13:46:14 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x3f000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:14 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x20000, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:14 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000100)='smaps_rollup\x00') setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='ip6_vti0\x00', 0x10) get_robust_list(r0, &(0x7f0000000140)=&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)}}, &(0x7f0000000180)=0x18) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0xfcbe}, {&(0x7f0000001500)=""/135, 0x87}], 0x100000000000003b) 13:46:14 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x2000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x20000, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:14 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100f0ff", 0x24) 13:46:14 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x2, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x7]}, 0x10) 13:46:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x4}) 13:46:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:15 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100003c", 0x24) 13:46:15 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x100000000000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:15 executing program 5: r0 = open(&(0x7f0000001540)='./file0\x00', 0x20400, 0x40) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000001580), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x0, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:15 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x3f00000000000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:15 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000100)={0x80, 0x80000001, 0x7, 0xeff, [], [], [], 0x6, 0x4, 0x0, 0x9, "288f0083bab3f24e6f2681ceb445161e"}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) 13:46:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x67, 0x1, 0x6}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={r2, 0x4}, &(0x7f0000000280)=0x8) 13:46:15 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x2000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x2000000000000000]}, 0x10) 13:46:16 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000140)=""/180) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') write$P9_RUNLINKAT(r0, &(0x7f0000000100)={0xff08, 0x4d, 0x1}, 0xfffffffffffffd11) readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x40, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0xe, &(0x7f0000000080)='ppp1wlan0proc\x00'}, 0x30) syz_open_procfs(r3, &(0x7f0000000240)='net/ptype\x00') 13:46:16 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000340", 0x24) 13:46:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x0, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r2 = dup2(r1, r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000300)={@local, 0x6e, r3}) 13:46:16 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x200000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x0, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:16 executing program 5: socketpair$unix(0x1, 0x1008, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:16 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000300", 0x24) 13:46:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f6b636d0008001c30f3e6650654184f89922108885c0912f80235ea377cc26acae489718bfb047c9debd90e363ea035671dfb2c2d80b6ec5f2c6c31a31e90385451c894c16737511f75bb9818e39d2a3edf44e79706dd30e279f982cd969eb9edc00f48669a3ac40f5f435003ba82de1d422e") readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:16 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x3f00, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009f0000000000050000000000000000009500000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xfeffffff]}, 0x10) 13:46:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, 0x0) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/164, 0xa4}, {&(0x7f0000000100)=""/127, 0x7f}, {&(0x7f0000000180)=""/33, 0x21}, {&(0x7f00000001c0)=""/123, 0x7b}], 0x4, 0x0) 13:46:17 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:17 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0xffffffff00000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2d6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={"74756e6c300042b5abd3a915edee00"}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000400)={0x0, 0x0, @ioapic={0x0, 0xffff}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, 0x0) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:17 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xa3, 0x20000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/kcm\x00\b\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, 0x0) readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) lsetxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@md5={0x1, "9b0069a1039a24bf8d9f0523f99d9ccb"}, 0x11, 0x3) 13:46:17 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x20000000000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:17 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001ffffff", 0x24) [ 2031.951173] *** Guest State *** [ 2031.969320] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 2031.979783] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 2031.979792] CR3 = 0x0000000000000000 [ 2031.979803] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 2031.979816] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 2031.979833] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 2031.979850] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 2031.979873] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2031.979906] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 2031.979927] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2031.979949] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2031.979976] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2031.980007] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 2031.980034] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 13:46:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, 0x0) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:17 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280017fffff", 0x24) [ 2031.980051] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 2031.980074] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 2031.980087] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 2031.980103] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 2031.980117] Interruptibility = 00000000 ActivityState = 00000000 [ 2031.980124] *** Host State *** [ 2031.980139] RIP = 0xffffffff812047de RSP = 0xffff8881bb967390 [ 2031.980182] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 2031.980198] FSBase=00007f8f9e584700 GSBase=ffff8881daf00000 TRBase=fffffe0000033000 [ 2031.980212] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 2031.980230] CR0=0000000080050033 CR3=000000017a1be000 CR4=00000000001426e0 [ 2031.980247] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87e01360 [ 2031.980260] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 2031.980266] *** Control State *** [ 2031.980291] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000cb [ 2031.980300] EntryControls=0000d1ff ExitControls=002fefff [ 2031.980314] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 2031.980325] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 2031.980336] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 2031.980346] reason=80000021 qualification=0000000000000000 [ 2031.980355] IDTVectoring: info=00000000 errcode=00000000 [ 2031.980363] TSC Offset = 0xfffffbbe1ea8aec9 [ 2031.980370] TPR Threshold = 0x00 [ 2031.980388] EPT pointer = 0x000000018186901e 13:46:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x20000000]}, 0x10) 13:46:17 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x1000000000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000000900)=[{&(0x7f0000000000)=""/141}, {&(0x7f0000000840)=""/171}, {&(0x7f00000006c0)=""/152}, {&(0x7f0000000280)=""/172, 0x43086e815854487a}, {&(0x7f0000000340)=""/49}, {&(0x7f0000000380)=""/50, 0xfffffffffffffea1}, {&(0x7f00000003c0)=""/179, 0xff62}, {&(0x7f0000000480)=""/222}, {&(0x7f0000000580)=""/82}], 0x27) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/169, 0xa9}, {&(0x7f0000000200)=""/11, 0xb}, {&(0x7f00000009c0)=""/232, 0xe8}], 0x3, &(0x7f0000002c00)=[{&(0x7f0000000600)=""/4, 0x4}, {&(0x7f0000000780)=""/161, 0xa1}, {&(0x7f0000000640)=""/17, 0x11}, {&(0x7f0000000ac0)=""/141, 0x8d}, {&(0x7f0000000680)=""/22, 0x16}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000002b80)=""/102, 0x66}], 0x8, 0x0) 13:46:17 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:17 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001fffff0", 0x24) 13:46:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b400000000000000950000000000000000000000000000000000000000b28900"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8040, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x80000000, 0x1a8, 0xffffffff00000001, 0x3f, 0x42}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000380)={r2, 0x48, &(0x7f0000000300)=[@in={0x2, 0x4e22, @rand_addr=0x5}, @in6={0xa, 0x4e24, 0x1, @loopback, 0x7}, @in6={0xa, 0x4e20, 0x1f, @ipv4={[], [], @loopback}, 0x2b68}]}, &(0x7f00000003c0)=0x10) 13:46:18 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:18 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:18 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x200000000000000, 0xd4, &(0x7f0000000200)=""/212, 0x41100}, 0x48) 13:46:18 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0xc4000, 0x0) clock_gettime(0x4, &(0x7f0000002c80)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0xfffffe78, &(0x7f00000012c0)=[{&(0x7f0000000180)=""/230, 0xe6}, {&(0x7f0000000280)=""/62, 0xfffffffffffffeed}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x3, &(0x7f0000002f40)=""/160, 0xa0, 0xba}}, {{&(0x7f0000002d40)=@nl=@proc, 0x80, &(0x7f0000001640)=[{&(0x7f0000001440)=""/23, 0x17}, {&(0x7f0000002ec0)=""/109, 0x6d}, {&(0x7f00000016c0)=""/186, 0xba}], 0x3, &(0x7f0000001780)=""/37, 0x25, 0x2}, 0x3}, {{&(0x7f00000017c0)=@nl=@proc, 0x80, &(0x7f0000001880)=[{&(0x7f0000001840)=""/48, 0x30}], 0x1, &(0x7f0000002dc0)=""/207, 0xcf, 0x7}, 0x10000000001}, {{&(0x7f00000019c0)=@nl, 0x80, &(0x7f0000002a80)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/1, 0xfffffffffffffeab}], 0x2, &(0x7f0000002ac0)=""/186, 0xba, 0xa}, 0x3}], 0x4, 0x40000120, &(0x7f0000002cc0)={r2, r3+30000000}) r4 = syz_open_procfs(r0, &(0x7f0000000000)='net/mcfilter6\x00') readv(r4, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) clock_gettime(0x923c2f2781a889b3, &(0x7f0000002d00)) signalfd4(r4, &(0x7f0000000040)={0x10009}, 0xffffffffffffff7e, 0x80000) 13:46:18 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9d) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x220000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') write$FUSE_POLL(r0, &(0x7f0000000340)={0x18, 0x0, 0x4, {0xda}}, 0x18) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000040)='net/kcm\x00\b\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x1, 0x6, 0x1, 0x5, '\x00', 0x3f}, 0x3, 0x1, 0x7, r1, 0x2, 0x3a, 'syz1\x00', &(0x7f0000000100)=[')\x00', 'net/kcm\x00\b\x00'], 0xc, [], [0x9, 0x5, 0xd657, 0x6]}) readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0xfffffffffffffe4a}, {&(0x7f0000000280)=""/135, 0x87}], 0x11730384422bc1b) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000380)=""/90) 13:46:18 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:18 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001943c00", 0x24) 13:46:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x2000]}, 0x10) 13:46:18 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41102}, 0x48) 13:46:18 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 13:46:18 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x100000000000000}, 0x48) 13:46:18 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001030000", 0x24) 13:46:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x5fc, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x30000, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) 13:46:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x101000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x6, 0x402002) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, &(0x7f0000000300)='./file0\x00') 13:46:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4008000000000009f0000d11400000000000000000000009500000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) 13:46:19 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x200000000000000}, 0x48) 13:46:19 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xa00]}, 0x10) 13:46:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/kcm\x00\b\x00') socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000400)={{0x6, 0x7, 0x8, 0x43, 'syz0\x00', 0x7}, 0x1, [0x5f4e6335, 0x6, 0x7, 0x0, 0x8, 0x1, 0x0, 0x9, 0x0, 0x20, 0x1f, 0x0, 0x9, 0xe7e, 0x2, 0x2, 0x7, 0x9069, 0x46, 0x80000000, 0x0, 0x2, 0x1, 0x3dfb, 0x0, 0x7, 0x8, 0x0, 0x100000000, 0x5, 0x5, 0x6, 0x89, 0x4, 0x929, 0x0, 0x7ff, 0x401, 0xe9d, 0x3f, 0x7, 0x4, 0x0, 0x7fffffff, 0x8, 0x3, 0x4, 0x5, 0x6, 0x40, 0x3, 0xb54, 0x80, 0x2, 0xf, 0x1, 0x799, 0x0, 0x4, 0x5, 0xffffffffffff921c, 0x0, 0xe42, 0x8, 0xa29f, 0x5be, 0x8, 0x0, 0x1, 0x0, 0x100000001, 0x3, 0x7, 0x77, 0x0, 0x5, 0x4, 0x400, 0x7, 0x6, 0x1, 0x19ba, 0x0, 0x5, 0xfffffffffffffe00, 0x4, 0xd2, 0x6, 0x0, 0x40010000, 0x3e, 0x7, 0x8, 0x4, 0x101, 0xfff, 0x7, 0x1, 0x8, 0x5dec, 0x1, 0x3, 0x5, 0x6, 0x80000001, 0x0, 0x81, 0x4, 0x0, 0x0, 0x8, 0x2, 0x8, 0xff8f, 0xfffffffffffff001, 0x0, 0x8, 0x6, 0x7, 0x0, 0x6, 0xffffffff, 0x6, 0x5, 0xffffffff, 0x1000, 0x400000000000, 0x25e], {0x77359400}}) mq_getsetattr(0xffffffffffffffff, 0x0, &(0x7f0000000940)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000980)='IPVS\x00') r2 = syz_open_dev$dmmidi(0x0, 0x4, 0x8000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0), 0x1, 0x0, 0x0, 0x4000040}, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x2, 0x4, 0x240000000000000, 0x2]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000100)=0x400, 0x4) r4 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x800000000105082) r5 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc4c85513, &(0x7f00000009c0)={{0xa, 0x6, 0x200, 0x7, 'syz1\x00', 0x7}, 0x0, [0xbe81, 0x0, 0x4, 0x9, 0x9, 0x100000001, 0x4, 0x2, 0x7, 0xee88, 0x1fe190a6, 0x8e2, 0x8000, 0xfffffffffffffffd, 0x7, 0xffffffffffff8000, 0xbdd, 0x20, 0x8000, 0x80000001, 0x4, 0x7, 0x9, 0x2, 0x7f, 0x7, 0x0, 0x1, 0x1, 0x2, 0x1, 0x5c7, 0x80000001, 0xfffffffffffffc00, 0x9, 0x5, 0x80, 0x1, 0x1ff, 0x7fff, 0x5, 0xfffffffffffffa7d, 0x843, 0xba71, 0x8231, 0x1, 0x7ff000000000, 0x8, 0x0, 0x100, 0x400, 0x100, 0x3f, 0x7, 0x0, 0x800, 0x80000001, 0x7, 0x7, 0xff, 0x0, 0x9, 0x1, 0x4198, 0x1fdc, 0x80000000, 0x0, 0x8, 0x52, 0x3, 0x401, 0x5, 0x1, 0x6, 0xffffffffffffffe5, 0x7, 0x3, 0x55, 0x2, 0x2, 0x80000000, 0xff, 0x40, 0xf2, 0x5, 0x6, 0xe0, 0x3, 0x7fffffff, 0x9, 0x4, 0x1000, 0x3, 0x5, 0xffffffff, 0x4, 0x101, 0x2, 0x8, 0x3, 0x3ff, 0x0, 0x100, 0xfffffffffffffffa, 0x400, 0x3, 0x6, 0x2, 0x7, 0x5, 0x0, 0x0, 0x3, 0x31dc, 0x1, 0x1, 0x1, 0x6b49, 0x8, 0xffffffffffffff80, 0x3c, 0xb2, 0x1, 0x1, 0xffff, 0x3, 0xfffffffffffffff9, 0x6], {0x77359400}}) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f0000000140)={0x8, 0xffffffff80000000}) sendfile(r4, r4, &(0x7f00000ddff8), 0x102000000) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x7, [0x1, 0x1000, 0x8da, 0x5, 0x9, 0x3, 0xfffffffffffffff9]}, &(0x7f0000000080)=0x12) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xffff}, 0x28, 0x1) 13:46:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009f000000000000000500000000ff07000000000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xca) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000200)={0x800, 0x8bbd}) 13:46:19 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x200000}, 0x48) 13:46:19 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:19 executing program 2: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:19 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x3f00}, 0x48) 13:46:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x674441, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000200)={0x1, 0x5, {0xffffffff, 0x7fff, 0x200, 0x8}}) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000240)={0x8, 0x9, 0xfffffffffffffff9, 0x0, r1}) 13:46:19 executing program 2: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:19 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001ffffff", 0x24) 13:46:20 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:20 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x2000}, 0x48) 13:46:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000580)={0x14, 0x0, &(0x7f0000000400)=[@dead_binder_done, @acquire={0x40046305, 0x4}], 0x0, 0x0, 0x0}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) [ 2035.086831] binder: 30785:30786 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 2035.094371] binder: 30785:30786 Acquire 1 refcount change on invalid ref 4 ret -22 13:46:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x1800]}, 0x10) 13:46:20 executing program 2: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net\x00') fstat(r4, &(0x7f0000002a80)) write$P9_RLOCK(r2, &(0x7f0000000000)={0x8, 0x35, 0x1, 0x3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x6) 13:46:20 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0xffffffff00000000}, 0x48) 13:46:20 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:20 executing program 1: getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000280)="210508fffd") ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000040)) readv(r1, &(0x7f0000000040), 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000180)={{0x2, 0x4e23, @multicast1}, {0x306, @random="e70be9ed43b8"}, 0x0, {0x2, 0x4e24, @rand_addr=0xfff}, 'syz_tun\x00'}) getsockname(r1, &(0x7f0000000100)=@ax25, &(0x7f0000000000)=0x80) 13:46:20 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001f0ffff", 0x24) 13:46:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-net\x00', 0x2, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000300)={@multicast2, @multicast1, 0x0}, &(0x7f0000000340)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000200)='GPL\x00', 0x4ae9, 0xae, &(0x7f0000000240)=""/174, 0x0, 0x1, [], r0, 0x9}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1d, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0xfffffee6) 13:46:20 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x20000000000000}, 0x48) 13:46:20 executing program 2: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:20 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x81, 0x0) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:20 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) readv(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x218]}, 0x10) 13:46:21 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001040000", 0x24) 13:46:21 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000040)='im\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f00000000c0)={0xfffffffffffff38c, @remote}) 13:46:21 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x1000000}, 0x48) 13:46:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:21 executing program 2: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:21 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001020000", 0x24) 13:46:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000000)={0x4, 0x3, 0x3, 0x7abf, 'syz1\x00', 0x20}) 13:46:21 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x2000000}, 0x48) 13:46:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)='syzkaller\x00', 0x9, 0xca, &(0x7f0000000280)=""/202, 0x41100, 0x1, [], r1, 0x5}, 0x48) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x52000, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000540)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000009f00000000000000050000000000000095040000000000000095cdfb1680f3f1df1edec3c4d04cfa8c092a4f076a4e43b517d68a"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xff0f000000000000]}, 0x10) 13:46:22 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x3f000000}, 0x48) 13:46:22 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000240)=0x0) getpgid(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') readv(r1, &(0x7f00000002c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) fcntl$notify(r1, 0x402, 0x2) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x9, @mcast2, 0x6}, r2}}, 0x30) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000280)={0x5, 0x81}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') syz_kvm_setup_cpu$x86(r3, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="67f30f1bb39be400000f21eb6665f466b9800000c00f326635000800000f30f43e670f0666b9800000c00f326635004000000f30bad00466b8cdd2000066ef0f07f20f1a6857", 0x46}], 0x1, 0x8, &(0x7f0000000200)=[@flags={0x3, 0x40000}, @cstype3={0x5, 0x3}], 0x2) 13:46:22 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x200500, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000500)={0x0, @rand_addr, @multicast2}, &(0x7f0000000540)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @broadcast, @dev}, &(0x7f0000000680)=0xc) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000001b00)={'veth1_to_bridge\x00', @ifru_addrs=@hci={0x1f, 0x0, 0x2}}) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000001d80)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001d40)={&(0x7f0000001b40)={0x1e4, r3, 0x400, 0x70bd28, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x1c8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x85}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x401}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x5, 0x4, 0x8, 0x7}, {0xdbef, 0x0, 0x8, 0x1}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x4, 0x805, 0xe9, 0x9}, {0x2, 0x5, 0x7, 0x61}, {0x100000001, 0x5, 0x20, 0x1f}, {0x778, 0x101, 0xffffffff, 0x8000}]}}}]}}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009f0000800074638fcac4a06133a05c579f9cbb0000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, 0x0, 0x0) 13:46:22 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:22 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x2}, 0x48) 13:46:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, 0x0, 0x0) 13:46:22 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') 13:46:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c29886669700", 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000300)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000340)=0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:22 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x6000000]}, 0x10) 13:46:23 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x3f00000000000000}, 0x48) 13:46:23 executing program 1 (fault-call:4 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, 0x0, 0x0) 13:46:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000340)) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x80000) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000280)={0xe, 0x9, {0x53, 0x6, 0x6, {0xbef, 0x8001}, {0x100, 0x1}, @period={0x5c, 0x32e, 0x8, 0x1, 0x8, {0x8, 0x4, 0xbffe, 0xc5}, 0x1, &(0x7f0000000200)=[0x5]}}, {0x55, 0x20, 0xa6b, {0x9, 0x1f}, {0xffff, 0x7}, @period={0x5d, 0xac, 0x9, 0x100000001, 0x6, {0x3, 0x2eb, 0x11, 0x1}, 0x3, &(0x7f0000000240)=[0x1, 0x6, 0x0]}}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x5, &(0x7f0000000380)=0x0) io_submit(r3, 0x6, &(0x7f0000001840)=[&(0x7f00000013c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000003c0)="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", 0x1000, 0x0, 0x0, 0x3, r1}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x3, r1, &(0x7f0000001400)="df2ee484ae151737fafa39ac483ab22269c9a47d34d416e61e4eb03c04b03b47c444bd6bb6402126a047394b2b209bf593135072bc515319f25dd5847842617134c407c7a7190a099e1de0824a652ff9c16265b792582e70e14d7d0f958c785649782a15b03ec71db04f865b9d805ea12e2f941cf5863a3b4db2b99019d5fb9eb866f7cd6cbf2efa728dfdab1d7dac39ce7583bcc6ec5e87e13c7b805b08a6ad83aebe9e7f8a874d70847486bec36d9c4a89eae155fcc0c108bcffc97a97588d833fe7cd509b1ae10e4d7da4e957469bb8c17845a1e49e3b2e65e85bd3532724a0", 0xe1, 0x5, 0x0, 0x1, r2}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x7, 0x8393, r1, &(0x7f0000001540)="34e4fe355857d1d7a42bb286699725ce172d3fa90f783cc19c0454ecdfe45fe5441efe4beb7d37220081af3cde974cc9b82091428855b1ee3b324057625be89a936b21203ff0ef55d467a5648f5c4c8cf8e9ba9df0649caf48ca04e22d67791829ec98474ca7de179c5b3a8a4de1e93a4f1ca707efebb6cd56f30cc0a2052a200e99adde7ddcc20fe29ea0a29853110bf7e1fdb1658bcbf766cf9b4a24c0db8bff1b7b2c", 0xa4, 0x0, 0x0, 0x2, r2}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0xf, 0x1, r2, &(0x7f0000001640)="5ae2e81b5d9de2ec6b825d62923e38ddf86ee6887ba642ae1fe617457bcc6db253", 0x21, 0x0, 0x0, 0x1}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0x9, r1, &(0x7f00000016c0)="bc4b41473d6beedad9ea7528f0def2e94f37cb", 0x13, 0xffffffff, 0x0, 0x1, r2}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x6, 0xffffffffffff7fff, r0, &(0x7f0000001740)="d85a7a403c8ec6ff450ee840112f12470558dbb82db3055900b3e07ce3cee8ba9a21c2af61428643be40d13a0e01f197ea9e49f8837c274cf60cf74cfd037e659b581a1c4c97814e919f55f0903ecda7372502f8778e0153b6569ddc5fecc6d0dab2478824ff11d75c5ad9b311eb074f836b4d41cbff940b8626931d5849ec0d3711967591e629fc408806a75d5bfc6f7993c9bb66d146d6a04f63429afe1bea31", 0xa1, 0x8, 0x0, 0x3, r1}]) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001880)=ANY=[@ANYBLOB="b400000000000000ae19c2d054e5c24a73fcad38b3109f0000000000000005023d3569713178f867d7ac43846a19da22c5d77ea238396849332964ba83e8d9fc41f3f00abb2b21c8a4c7a8b7b689cb1a1bf72e27a4a803db9621a0e28ff477073ac4f0a240fb859f4f7fb69f9594eb4fadf1b005ab51a5e8c57a1826408b71c5ed62e7ab1e688c58fe7ab81169d3ac3a4e4d6f5c0cabdc50154b61eefc9dbd589ccc8875199b5a587582d2c7225926613438cff05d3b50e9"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:23 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:23 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:23 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x1000000000000}, 0x48) 13:46:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}], 0x1) 13:46:23 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:23 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl$KDDISABIO(r0, 0x4b37) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='bridge_slave_0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f00000004c0)=""/238, 0xee, 0x42, &(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000380)="32e2f5149edb1768f68a438e38fc46ed6e7220bdb88b116f66022b623cab254f6901ef63ce55cdb690a000f21175e0eac75617fd952a9388ba27849b69a49419cc7a35de8fe83e28f1101ccccdd7e63ac5d882e0e7f1b3cc4eaef42462c35e46c60a352b37946df924077dec4d83340530ec066bf988316bc4ab3b6b68621c0c830e273f624cc9792aa39e9dbde8b64955a9f4c95a2cedaad335be829d7c5d2b994fee586cb32bccc706c59a8163dd456743430cdf410a0a94a24bcde466d9733189e5f30e154064d3541d8c5cfaad972df8d660c8f6", 0xd6}, {&(0x7f0000000280)="aa8aac6edef9bc1c92f6fc34608582a509aa6c5f551a26b5fc34bdef65b92d6c3d7044a45a2ca3659ae404220e27c3151892ebba5bf86eda6f185f86d05310d0cd368713a315211034499e5ff1c47ab9992b90", 0x53}], 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b40000000000009f320000c19900000005000000a19500000000000094d8feda3cd5f94600382f32b7f51b38a8f8f08d3305ba49c1fc92adfca548259800000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='system.posix_acl_default\x00') r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/199, &(0x7f00000001c0)=0xc7) stat(0x0, 0x0) r2 = memfd_create(0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000240)={0x3, &(0x7f0000000200)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000280)={r3, 0x2}) dup(r2) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:24 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x200000]}, 0x48) 13:46:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}], 0x1) 13:46:24 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100f000", 0x24) 13:46:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xf0ffffff7f0000]}, 0x10) 13:46:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0xaf}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e21, 0x81, @empty, 0xfffffffffffffff7}}, 0x1f4, 0xafc}, &(0x7f0000000340)=0x90) 13:46:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 13:46:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}], 0x1) 13:46:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$EVIOCGABS0(0xffffffffffffff9c, 0x80184540, &(0x7f0000000080)=""/252) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:24 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x2000000]}, 0x48) 13:46:24 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f00000002c0)={@remote, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @local, @multicast2}, &(0x7f0000000380)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000580)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a40)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000700)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000bc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000c00)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @broadcast}, &(0x7f0000002380)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002400)=0x14, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002440)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000002540)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000002b40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10089}, 0xc, &(0x7f0000002b00)={&(0x7f0000002580)={0x54c, r2, 0x819, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xcb2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r6}, {0x1d8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3614}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r8}, {0xac, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8, 0x0, 0x7, 0x2}, {0x6, 0x4, 0x9, 0x87}, {0x2, 0x4, 0xfffffffffffffff7}, {0xc44, 0x8, 0x1000, 0xfff}, {0x5, 0x7, 0xfffffffffffeffff, 0x5b39}, {0x475, 0x3485, 0xffffffffffffffff, 0x1}, {0x30, 0x100, 0x7, 0xfff}]}}}]}}, {{0x8, 0x1, r10}, {0x154, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x200, 0x88, 0x5, 0x67}, {0xffffffffffff7fff, 0x10000, 0x5, 0x7}, {0x2, 0x5, 0x9, 0xada1}, {0x100000000, 0x7, 0x1, 0x8}, {0x81, 0x6, 0x100000001, 0x2}, {0xffff, 0x0, 0x8, 0xfffffffffffffff8}, {0x10000, 0x7fff, 0x1, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x537}}}]}}, {{0x8, 0x1, r12}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r13}}}]}}]}, 0x54c}, 0x1, 0x0, 0x0, 0x8000}, 0x40004) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {0x0}], 0x2) 13:46:24 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x3f000000]}, 0x48) 13:46:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {0x0}], 0x2) 13:46:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, 0x0) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x2840) syz_genetlink_get_family_id$ipvs(0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) link(0x0, 0x0) 13:46:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x700]}, 0x10) 13:46:25 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x400000, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400101, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x28003, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000340)=""/66) connect$l2tp(r0, &(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x0, 0x3, 0x1, {0xa, 0x4e23, 0x3f, @mcast1, 0x4}}}, 0x32) ioprio_set$uid(0x3, r3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x480202) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xfffffffffffffffe, 0x1b, &(0x7f0000000200)=ANY=[], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x8, 0xfffffffffffffef8, 0x0, 0x400000}, 0x48) prctl$PR_SET_PDEATHSIG(0x1, 0x23) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x1, 0x4) 13:46:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {0x0}], 0x2) 13:46:25 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x3f00]}, 0x48) 13:46:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x400000100000) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:25 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x2]}, 0x48) 13:46:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x4480, 0x80) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000340)={0x0, 0x5, 0x9, 0x0, 0x100000000, 0x8e34, 0x4, 0x80, {0x0, @in6={{0xa, 0x4e24, 0x5, @loopback, 0x6}}, 0x1, 0x5ce, 0x400, 0x3, 0x3}}, &(0x7f0000000400)=0xb0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000440)={r2, @in={{0x2, 0x4e21, @empty}}}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b4000000000000009f00000000ff00000500000000000000be4000000000000017739900625304e4a8d682f0f1e4961d98ce0b8b8c012394e4a0d5f204aea9f55967b8e398d4f65290bf83accae9"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001500)=""/135, 0x87}], 0x1) 13:46:25 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:25 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$KDSKBLED(r0, 0x4b65, 0x101) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x400, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r2 = memfd_create(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x7, 0x21, 0x1}, 0x7) setrlimit(0x5, &(0x7f00000000c0)={0x9, 0x7bb}) syz_genetlink_get_family_id$ipvs(0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xf85, 0x8002) link(0x0, 0x0) 13:46:25 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x1000000000000]}, 0x48) 13:46:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x1800000000000000]}, 0x10) 13:46:26 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfff) r2 = gettid() r3 = geteuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)=0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000680)=0x0, &(0x7f00000006c0), &(0x7f0000000700)) r8 = fcntl$getown(r0, 0x9) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() r11 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000a80)=0xe8) r13 = getgid() fcntl$getownex(r1, 0x10, &(0x7f0000000dc0)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000f00)=0xe8) stat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001000)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001040)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001140)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001180)={0x0, 0x0, 0x0}, &(0x7f00000011c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001d40)={0x0}, &(0x7f0000001d80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001dc0)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000001ec0)=0xe8) getgroups(0x3, &(0x7f0000001f00)=[0xee00, 0xee01, 0xffffffffffffffff]) r23 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = getpgid(0xffffffffffffffff) r27 = geteuid() getgroups(0x5, &(0x7f00000020c0)=[0xee00, 0x0, 0xee01, 0x0, 0xffffffffffffffff]) r29 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002100)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000002200)=0xe8) fstat(r0, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r32 = gettid() r33 = getuid() getresgid(&(0x7f00000022c0), &(0x7f0000002300)=0x0, &(0x7f0000002340)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000002380)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000024c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002500)={0x0, 0x0, 0x0}, &(0x7f0000002540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002580)={0x0}, &(0x7f00000025c0)=0xc) r39 = geteuid() fstat(r1, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000002780)=[{&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000340)="e287797e148c1493e075b0282bffefe2beeac038b67186d3837835045cf3f453c1725a3616139dea05ee12962e42152a8d153591ce4f776a807a52b09bd38143bb3cbdb5f9894254fb7f312d2189eaf681c03ad8", 0x54}, {&(0x7f00000003c0)="0291b5e8257dd55e1974131347f98c42a0b483e40ef5f6594690248243ee9377e37e7d6524924ce5136d81156996d76c00a803c95c411bc458f5b7eb3ed308d07feac57f02d8b0614703dba28daeea4cd55829dfd2ed3bf18b441c22fd459790242298cc45ef0bd1d1eeab0e26bc97f1c956c3981216f5a8c7381032a9341bcc3b550131e68d5de29f4f3df46d99fe89ec8f0f80b17e647ab0cbeaa71bed3a176e694d5d80ad0974a228911a6c13ab3bab263da00662d83598", 0xb9}], 0x2, &(0x7f00000028c0)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="00dc3c8044958af8b8f5d0227d3abc0cc22b0700"], 0x58, 0x20004804}, {&(0x7f00000007c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000840)="09ddf692a73b", 0x6}], 0x1, &(0x7f0000000ac0)=[@rights={0x20, 0x1, 0x1, [r0, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}], 0x60, 0x880}, {&(0x7f0000000b40)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000bc0)="a536ce464fd94cf865b712cc3897ca8c9a901ad50d975ccece604988cf6f742288ce55bad33d295d3c15ecb6c0acbe711f44d80a35b243430aac92e1280013eed5da7fbffe271ab89fdcb27c696e985ca47b533b76850a104baf114deb42ae13fc209d243bfab187a9247dd6c222ff20960cb7914425b04c1d7cc2161550d87d69261de19c383e37386df212a85845b7faaaf8de7f59a7641c485a4055ea2819cf467d89147f05f4c28fae7890b0790add400aeb11", 0xb5}, {&(0x7f0000000c80)="1e1ff2c3c4444c8683343da7f086adda8f92e75bf2c7ba2b869fc10efb121b93fa3578c471a822ae3759f40f", 0x2c}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)="13e1660d5c9f0c217f14623c762cbcea3e46ce008b32a33caaec24acb4b31299182431e0fdb91ac9c81b2b6246ce0ecf4de939383fce55f6d2359a668d14ba0d3451584f5a3aa28aa7051b1b", 0x4c}], 0x4, &(0x7f0000002940)=ANY=[@ANYBLOB="38000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000020100000080533002a295853dfec1d31695b9b275490d6f19fb59aec895a96ce5b889ee5584682cad4944e5fafd639e7d9e26f3cee7dc39a1f4a860d2f1410d78e0d77dd43b20b841e8fb48004590b338159a68b85f97b5dad5a29d4a8f6b7c1b34c922196d8d65680f3693bea7c072f86c59f17f05a4b8b7c41726434f5f0213081bd3bf8e3141a7b3d105dd96c8469d3270d9c38be97d02911389db513c057963eafbed94006568dd5811a9c6668d25dd1f082965b21455d804447e5d81ecc32f6b274e6fab8e505e167bbb2d8ee", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x10}, {&(0x7f00000012c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000014c0)=[{&(0x7f0000001340)="f891141b3ef0ca", 0x7}, {&(0x7f0000001380)="0ac6bcca0177fbe1391ce22c81e2d3cf9758c01797fc431ace208ef6a1168e6b07e655252a18", 0x26}, {&(0x7f00000013c0)="d3d9b5e5d9af76cf0c15c74001c07e915601d9579e7a56f0d7f9b4974d053ef00c1d005f076d12998c667129400817060de907b5cc1d14755ee214ecde5543977b829fc64c4afea111683e6ca1db04b3b5809f011d4bbb3e1d4273563de18ecb0834c5e34aba5724aeb155329c46bd97368a504e89f6c1eea8ad02c9e288601865ddc97c7cd892d1e139bf5fed0f8c9fe03f0c8d7c8c7db49d8e49207d9a9c82373038850367cd7e271d20d1537952c0cf4f38fb47871a92fd41718e005aa9d34e70f601ac04", 0xc6}], 0x3, &(0x7f0000001500)=[@rights={0x28, 0x1, 0x1, [r0, r0, r1, r0, r0, r1]}], 0x28, 0xc000}, {&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f00000015c0)="2cc5dc610d2e8c255ecd2f49fea4e9e4e8313d80be1925b6065ec52e0e09a114602c0d20d411ecfa1f7a3dd22d33f0cbba352f97867f4a93115cf69ce64cf2e6a1510391d758f04fb4c5491f7efa31d6ddd8edf45e7db0088cbac39747b479063c190d9b8b9f633eaa961599fbc40f6f49341776c696ebfb8bb526124d302c224b79e28078bdf6f1077f6082ce8901262439e3f86e4633e243eb3e63e7a11bf3cea5661c92aba38c7bacacd74cc9c1cc0a20071556bf4526056d54c69bb0ded603f7c9ebab259fb89e77353850c83ed0142c0571c3848d4e81c6ae9e0338b18cdf21ed2ba9c9e63ba3", 0xe9}, {&(0x7f00000016c0)="c7454d8f1cd142a5d991f41fc0153a6a67272ddaea5ad76025e59e23a757ba40b1acdf6598ddd47ea9994a981a4f67238268a11767a157186a92407cf4682e17d38fa7ee68deaf6521e1e30011460d2c4705b469d4004b368f189365d10126ddcc0d56b9a26c527a8cb9910d32e0472bf24d928996f470e938784bd196835cd925b2bb5f5c624326a906653718607cee4872941c8511751937452741fd650cc48da321041b00113085b6ad020e08de68efe0228d8c96632401864d40", 0xbc}, {&(0x7f0000001780)="0b81fb1679d6e2914472d6421f0e1a72f8224b6bd334498ca9f05a73faa6a46e711156eefb19774e06cd39f0a8ec635b7ff2a7eced82695ea2b8811bc4d9d1143795c4275a39e1eacfb409e24b196ce1b2945a162ec8dc302fb46630d45fcca3b6f7e5dbcb69347a55fac267d653dfddbea87f2b0783b9ae27f7fc5919e7524aafaa9cfb9f59d830577314668fecea69da1bf479b4d51801ae105d643a1f39b8", 0xa0}, {&(0x7f0000001840)="c97691ef4382dbabe4", 0x9}, {&(0x7f0000001880)="9b1541d3f6827f7fcd60a919dfefda612946cfdc317abbd4752e035e2e522f5cb16ae2c7c61b8c69821738960185b25633aa22383e4e51b4a8fb9881d8389ef301f3118089c3561f91e988760661c758275d6221b6ff667a8ac1a1b18fdafb8ee2e8bffa025392e37e1de4d615edb624b36ebd31bbb5074cc0523fdb55feafcdb7bca23e793a75fbf7c6c3c32bf8284ce52908f3cd1126", 0x97}, {&(0x7f0000001940)="e9eb635faf1834fcd8b0b8f5ffa0fe7d7a58955df8c5442e7c5626214fd0f186effa8d3641b3933e66d6bbdfc23220257a9a7a054e89182e86e7503f33882a72ac844bdae096f14ee85c29dac04604da215a4f09f422a730206983968518bddb3f057d245059a41f7759e3b3d1684f696779cf8cf9edd84cc220388e6053fd76faf4b1fa3f4284abaf71f4991c12eddfc143da23ba5e7485f98ab52efa3ccfa3f81b9612cbbf827aafd6a2124f9ceb37132ce7aa39c4d0ce0068392c2fa99a1ea31a8438410f831aaaf5aa4df3", 0xcd}, {&(0x7f0000001a40)="3aed83265d5768089a7b595eb5d60927244a0d2d4e3212fce1514d40c67d66f798661d5363bc92445fc443943a862b7c7d71c6390106b5d5092a815aa78a8a6353362c2faa5023b6f8ef2a8ed891e57154bd78a4786abd6779e82a5b6adc79e2e062f434dbb025a59555d1d4561138ed5f6b426668a9080ad573d4d2a8922be2f3c74824acf5cd86120fb662bcaa16b9e304a66876d5d53b8a36984c72b647724270d9ddf1f30f9c0553244de74bbe492bce50236cd7ac80cbed27bc470f7bf572540e", 0xc3}, {&(0x7f0000001b40)="f22f48aa104d714d6a60f427d2c60e24398f79733e8b47fcebe0015c55b64c830fae84784d3402921ec6e3f8ce1a42d4d912a1f7eab8abfc094437830a5f996b5553f7dc6f6521680566226940b2820ec24bcf6197e6c738ee41bd25cfbf8381dc35341f9f9ef46f78fe79709fbc4665b0a3c5e98799b4cc70b3f384d28e91296318f6c02ae8d4324c2c", 0x8a}, {&(0x7f0000001c00)="27be8c38e3b0fa42bd7256aec94769ab", 0x10}, {&(0x7f0000001c40)="d87b98349d32a82a2fb8be3660a401936cc8e30e8f47d04ed7fcb18a636ab34ed211fea384fa390a5f14cd", 0x2b}], 0xa, &(0x7f0000002680)=[@cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r32, r33, r34}, @cred={0x20, 0x1, 0x2, r35, r36, r37}, @cred={0x20, 0x1, 0x2, r38, r39, r40}], 0xf8, 0x80}], 0x5, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b4000000000000009f00000000000000050000000000000095000000000000005070a7d5553d13702912fc25c4be4fc30584cebcb1a06421e07e51a46e37c31aa4123cbf014a52b7619f6918ffb1ec61ead58a17f878e89d04110d6ebcb7e6ab90829e020160cd7a27770b04a67bffd8c344cd81c3f6a2b307965017de9a53a8e733cd24d446e046beecd8f84826ae34"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r41 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/sequencer\x00', 0x40, 0x0) ioctl$KVM_CHECK_EXTENSION(r41, 0xae03, 0xf62) 13:46:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001500)=""/135, 0x87}], 0x1) 13:46:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x4) dup(r0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xff, 0x17, 0x7, 0x1, "bd711d3e7cf935fd6f79f50b72ec759f4e4bec9674815094098f84abdbcc9c0d9ca451e00c5125a8410ed6b4d789ce89e999455a09e30426efd2093b217db418", "f7c0b0e61c81085ff7359518a2772412ae61dfceeee44745a55c0c4612739ba2", [0x5, 0x81]}) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:26 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x100000000000000]}, 0x48) 13:46:26 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100ffff", 0x24) 13:46:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001500)=""/135, 0x87}], 0x1) 13:46:26 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100ffff", 0x24) 13:46:26 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x200000000000000]}, 0x48) 13:46:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x1, 0x2) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000240)=r1) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 13:46:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{0x0}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:26 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:26 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x1000000]}, 0x48) 13:46:26 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2) renameat2(r0, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) setrlimit(0x7, &(0x7f0000000000)) connect$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, {0x5, 0x101, 0x200, 0x7ff, 0x5, 0x7}, 0x6}, 0xa) stat(0x0, 0x0) r3 = memfd_create(0x0, 0x0) dup(r2) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f00000000c0)=""/60, &(0x7f0000000100)=0x3c) link(0x0, 0x0) 13:46:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x9]}, 0x10) 13:46:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000300)={'veth1_to_bridge\x00', @ifru_addrs=@xdp={0x2c, 0x4, r1, 0x3b}}) 13:46:26 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000f0", 0x24) 13:46:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{0x0}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{0x0}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:27 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:27 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x2000]}, 0x48) 13:46:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) r2 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000080)={0x7, [0x1f, 0xfffffffffffffff7, 0x7, 0xda29, 0xffff, 0x100000001, 0x9]}, 0x12) link(0x0, 0x0) 13:46:27 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x3f00000000000000]}, 0x48) 13:46:27 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x4b80b041}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000240)={0x6, 0x0, 0x8000, 0x8, 0x3, 0x8, 0x8, 0xfff, r3}, &(0x7f0000000280)=0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x1, &(0x7f0000001fd8)=ANY=[@ANYRES64=r3], &(0x7f0000000440)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x1bf}, 0x48) [ 2042.065411] FAULT_INJECTION: forcing a failure. [ 2042.065411] name failslab, interval 1, probability 0, space 0, times 0 [ 2042.119995] CPU: 0 PID: 31170 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #361 [ 2042.127374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2042.136736] Call Trace: [ 2042.139343] dump_stack+0x244/0x39d [ 2042.142997] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2042.148229] ? debug_smp_processor_id+0x1c/0x20 [ 2042.152922] ? perf_trace_lock+0x14d/0x7a0 [ 2042.157172] should_fail.cold.4+0xa/0x17 [ 2042.161251] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2042.166365] ? seq_read+0x71/0x1150 [ 2042.170012] ? mutex_trylock+0x2b0/0x2b0 [ 2042.174099] ? find_held_lock+0x36/0x1c0 [ 2042.178185] ? zap_class+0x640/0x640 [ 2042.181929] ? find_held_lock+0x36/0x1c0 [ 2042.186019] ? __lock_is_held+0xb5/0x140 [ 2042.190128] ? perf_trace_sched_process_exec+0x860/0x860 [ 2042.195617] __should_failslab+0x124/0x180 [ 2042.199907] should_failslab+0x9/0x14 [ 2042.203710] kmem_cache_alloc_node_trace+0x270/0x740 [ 2042.208847] ? find_held_lock+0x36/0x1c0 [ 2042.212916] __kmalloc_node+0x3c/0x70 [ 2042.216716] kvmalloc_node+0x65/0xf0 [ 2042.220412] seq_read+0x99b/0x1150 [ 2042.223941] ? fsnotify_first_mark+0x350/0x350 [ 2042.228675] ? __fsnotify_parent+0xcc/0x430 [ 2042.232983] ? seq_escape+0x240/0x240 [ 2042.236771] proc_reg_read+0x2a3/0x3d0 [ 2042.240648] ? proc_reg_unlocked_ioctl+0x3c0/0x3c0 [ 2042.245565] ? security_file_permission+0x1c2/0x220 [ 2042.250570] ? rw_verify_area+0x118/0x360 [ 2042.254740] do_iter_read+0x4a3/0x650 [ 2042.258533] vfs_readv+0x175/0x1c0 [ 2042.262076] ? compat_rw_copy_check_uvector+0x440/0x440 [ 2042.267450] ? wait_for_completion+0x8a0/0x8a0 [ 2042.272034] ? mutex_lock_nested+0x16/0x20 [ 2042.276284] ? mutex_lock_nested+0x16/0x20 [ 2042.280516] ? __fdget_pos+0xde/0x200 [ 2042.284299] ? __fdget_raw+0x20/0x20 [ 2042.288003] ? __sb_end_write+0xd9/0x110 [ 2042.292064] do_readv+0x11a/0x310 [ 2042.295501] ? vfs_readv+0x1c0/0x1c0 [ 2042.299201] ? trace_hardirqs_off_caller+0x310/0x310 [ 2042.304350] __x64_sys_readv+0x75/0xb0 [ 2042.308265] do_syscall_64+0x1b9/0x820 [ 2042.312145] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2042.317493] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2042.322414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2042.327263] ? trace_hardirqs_on_caller+0x310/0x310 [ 2042.332282] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2042.337293] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2042.342311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2042.347162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2042.352380] RIP: 0033:0x457569 [ 2042.355570] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2042.374456] RSP: 002b:00007f34eb81cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 2042.382145] RAX: ffffffffffffffda RBX: 00007f34eb81cc90 RCX: 0000000000457569 [ 2042.389423] RDX: 0000000000000002 RSI: 0000000020001680 RDI: 0000000000000003 [ 2042.396707] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2042.403973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f34eb81d6d4 [ 2042.411223] R13: 00000000004c37f6 R14: 00000000004d5e48 R15: 0000000000000004 13:46:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xa00000000000000]}, 0x10) 13:46:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) memfd_create(&(0x7f0000000080)='/dev/ppp\x00', 0x0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:27 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:27 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0xffffffff00000000]}, 0x48) 13:46:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x2, 0x0, 0x0, 0x7571}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000240)={r2, 0x6f76a376}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009eec003dfa26d5bb47edc4a6a322916100000000000500d1"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:27 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) [ 2042.721690] FAULT_INJECTION: forcing a failure. [ 2042.721690] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2042.733534] CPU: 0 PID: 31192 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #361 [ 2042.740903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2042.750266] Call Trace: [ 2042.752885] dump_stack+0x244/0x39d [ 2042.756542] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2042.761756] ? zap_class+0x640/0x640 [ 2042.765499] should_fail.cold.4+0xa/0x17 [ 2042.769583] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2042.774726] ? debug_smp_processor_id+0x1c/0x20 [ 2042.779401] ? perf_trace_lock+0x14d/0x7a0 [ 2042.783663] ? debug_smp_processor_id+0x1c/0x20 [ 2042.788344] ? perf_trace_lock_acquire+0x15b/0x800 [ 2042.793281] ? lock_is_held_type+0x210/0x210 [ 2042.797715] ? perf_trace_lock+0x7a0/0x7a0 [ 2042.801967] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2042.806916] ? kasan_check_read+0x11/0x20 [ 2042.811071] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2042.816349] ? zap_class+0x640/0x640 [ 2042.820075] ? rcu_softirq_qs+0x20/0x20 [ 2042.824103] ? rcu_read_unlock+0x16/0x60 [ 2042.828180] __alloc_pages_nodemask+0x366/0xea0 [ 2042.832853] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2042.837821] ? kasan_check_read+0x11/0x20 [ 2042.841974] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 2042.846984] ? __lock_is_held+0xb5/0x140 [ 2042.851186] ? trace_hardirqs_off+0xb8/0x310 [ 2042.855597] cache_grow_begin+0xa5/0x8c0 [ 2042.859689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2042.865238] ? check_preemption_disabled+0x48/0x280 [ 2042.870267] kmem_cache_alloc_node_trace+0x670/0x740 [ 2042.875377] ? find_held_lock+0x36/0x1c0 [ 2042.879456] __kmalloc_node+0x3c/0x70 [ 2042.883261] kvmalloc_node+0x65/0xf0 [ 2042.886978] seq_read+0x99b/0x1150 [ 2042.890532] ? fsnotify_first_mark+0x350/0x350 [ 2042.895116] ? __fsnotify_parent+0xcc/0x430 [ 2042.899436] ? seq_escape+0x240/0x240 [ 2042.903244] proc_reg_read+0x2a3/0x3d0 [ 2042.907147] ? proc_reg_unlocked_ioctl+0x3c0/0x3c0 [ 2042.912090] ? security_file_permission+0x1c2/0x220 [ 2042.917136] ? rw_verify_area+0x118/0x360 [ 2042.921310] do_iter_read+0x4a3/0x650 [ 2042.925126] vfs_readv+0x175/0x1c0 [ 2042.928675] ? compat_rw_copy_check_uvector+0x440/0x440 [ 2042.934054] ? wait_for_completion+0x8a0/0x8a0 [ 2042.938685] ? mutex_lock_nested+0x16/0x20 [ 2042.942946] ? mutex_lock_nested+0x16/0x20 [ 2042.947210] ? __fdget_pos+0xde/0x200 [ 2042.951018] ? __fdget_raw+0x20/0x20 [ 2042.954763] ? __sb_end_write+0xd9/0x110 [ 2042.958835] do_readv+0x11a/0x310 [ 2042.962299] ? vfs_readv+0x1c0/0x1c0 [ 2042.966023] ? trace_hardirqs_off_caller+0x310/0x310 [ 2042.971134] __x64_sys_readv+0x75/0xb0 [ 2042.975025] do_syscall_64+0x1b9/0x820 [ 2042.978915] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2042.984324] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2042.989285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2042.994144] ? trace_hardirqs_on_caller+0x310/0x310 [ 2042.999164] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2043.004199] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2043.009232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2043.014088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2043.019276] RIP: 0033:0x457569 [ 2043.022472] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2043.041370] RSP: 002b:00007f34eb81cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 2043.049093] RAX: ffffffffffffffda RBX: 00007f34eb81cc90 RCX: 0000000000457569 [ 2043.056365] RDX: 0000000000000002 RSI: 0000000020001680 RDI: 0000000000000003 [ 2043.063638] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 13:46:28 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x7ff, 0x0, 0xca, 0x1, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_pts(0xffffffffffffffff, 0x200) ioctl$TIOCCONS(r2, 0x541d) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000200)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2043.070912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f34eb81d6d4 [ 2043.078195] R13: 00000000004c37f6 R14: 00000000004d5e48 R15: 0000000000000004 13:46:28 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x20000000000000]}, 0x48) 13:46:28 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)='\x00'}, 0x30) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x80, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000006c0)='/dev/vcsa#\x00', 0x8, 0x2000000000020000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(r0, &(0x7f0000000000), r1, &(0x7f0000000600)=0x2000000000, 0x5, 0x5) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x800, 0x30802) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000700)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000200)) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@remote, @in6=@dev={0xfe, 0x80, [], 0x1d}, 0x4e23, 0x1000, 0x4e21, 0x8, 0xa, 0x0, 0x80, 0x3b, 0x0, r4}, {0xffffffffffff7414, 0x11c98ac9, 0x7, 0x8, 0x5, 0x80000001, 0x7, 0x4}, {0x0, 0x2, 0x4, 0x7f}, 0x9, 0x6e6bbd, 0x0, 0x1, 0x1, 0x3}, {{@in6, 0x4d6, 0xff}, 0xa, @in=@local, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffbc4, 0x400, 0xf2d1}}, 0xe8) sendmsg$key(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)={0x2, 0x8, 0x5, 0x7, 0x22b, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_key={0x10, 0x8, 0x390, 0x0, "2f494f5f3bc1e68d5dff3045e45f2b9bc1e2461ce8f5178afb0309887292e256dedf83b85a2f5f519d4b5bae9cc1d8790127ff9da512706c1a6d14c9c5bde28785cb0f10e01beb11589d9f3e0f8db13cf0c222b88d7ffbf471f036d061f8fce30b32cf4bb47a6c85b3ee18370ce65f2d700f"}, @sadb_key={0x201, 0x9, 0x8000, 0x0, "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"}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x0, @loopback}}, @sadb_address={0x5, 0x5, 0x7e, 0x80, 0x0, @in6={0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x1e}, 0x4}}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e23, 0x6, @remote, 0x7f}}, @sadb_x_filter={0x5, 0x1a, @in6=@ipv4={[], [], @multicast1}, @in6=@mcast2, 0x17, 0x10, 0x4}]}, 0x1158}}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="b4189432c972c7ba9b2dc1ac57e0283faefc7785630000000000000000009500006437ac787b5a8b080026b72c5e3991e200000000000000007368cf464dc41ad17587b152b9c20f6ed1cd9cfc349262edb53ad3bc6f51cfa632eece64b762edf1aa3a80987d188b4bcdfc2ea7feaa17f330c9"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x48) 13:46:28 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000f0", 0x24) 13:46:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x5000000]}, 0x10) 13:46:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000002c0)=0x6, 0x4) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x1c, 0x1, "02e507ccb6b9d125f18eb02217b9551a6bd9ee84beee3d4e8fa9d8209f9f53ea28d16430d1917c64ed5eff5cfc9851a9d32ce365be93f588d6dff02205929757", "2ecfe65be115e17869a1d121be672a7695dd5e854537040a39c366afdeb0f797fda33e1a8353e92b5fcbb880791fcf54a3aae8e9439ef314f1fe77009ae9b4c5", "37012b0f2d1c16c00abae7322ddd8ddfef74ca6644ed6c7e1b81faa60e100f5b", [0x1, 0x101]}) r2 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x8001}) bind$unix(r2, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000100)=r1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={r3, 0x80000, r0}) link(0x0, 0x0) 13:46:28 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100003f", 0x24) 13:46:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x100) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x3f}, {0x9, 0x9}, {0x20, 0x1}, {0x8000, 0x400}, {0xffffffff, 0x3}]}) 13:46:28 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0xffffffff00000000]}, 0x48) 13:46:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x404000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000200)=0x48, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:28 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x20000000000000]}, 0x48) 13:46:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x7ffff000}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x9, 0x1, 0x3, 0xffffffffffff0001, 0x3}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000000000009ff6bed0865ffdfdaadf2132a6d94c130000000000000000000000000b009500040000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0xffffffffffffff00, 0x0) sendto(r0, &(0x7f0000000340)="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", 0x1000, 0x8000, &(0x7f0000001340)=@ethernet={0x306, @random="af8bddec453a"}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x2, 0x10001) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000002c0)={0x7002, &(0x7f0000000240), 0xc, r3, 0x4}) 13:46:28 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000040", 0x24) 13:46:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000880)={0x0, 0x8001, 0x8}, &(0x7f00000008c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000900)={r1, 0x4, 0x10}, 0xc) r2 = memfd_create(0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000001c0)={0x4, 0x80000001, 0x7ffffffd, [], &(0x7f0000000180)={0x9b0951, 0x7fe, [], @p_u32=&(0x7f0000000140)=0x400}}) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x1, 0x4) link(0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000200)={0x0, @speck128}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x550, [0x0, 0x20000280, 0x200005c0, 0x200007a0], 0x0, &(0x7f0000000240), &(0x7f0000000940)=ANY=[@ANYBLOB="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"]}, 0x608) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$can_raw(r2, &(0x7f0000000100)={0x1d, r3}, 0x10) 13:46:29 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r2 = memfd_create(0x0, 0x100000000000004) r3 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$sock_int(r3, 0x1, 0xa, &(0x7f0000000080)=0x10001, 0x4) signalfd4(r0, &(0x7f00000000c0)={0x3a6f}, 0x8, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000100)={0x4, 0x1, 0x9748, 'queue1\x00', 0x80}) link(0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0xdf, "a08bee46ce6550eb5fa92e2ff482068e66bd3c2bca94dc15e1c1a84861733c216c375a2c96b895d4093d4612ec1514182df84e7be6d8b97967b40a0464a7e90f1d0d7c31c3837f62cd88e1ecb62d9fd10ec5e01ff9d9096c63ac120ca0da66ee24af94f1d516db8b8b0a07b22f5b3cfd2660c491fa0c0b85d3e27a2bcbc97ecd604e0352b9de5a47abe8ce36833988353993a599916b1d7454e7a466cedcf973c1fca3cf7f2740b1a62e02d9a3340bec346aefde0f704d13819878ce742f6c559619ec2ada23845a6fead37a8cbaf44898940f7ee29e489826b5fd56b5e05d"}, &(0x7f00000002c0)=0xe7) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r4, 0x8, 0x9}, &(0x7f0000000380)=0xc) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000300)={r4, 0xff}, 0x8) 13:46:29 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x100000000000000]}, 0x48) 13:46:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x4d}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x300]}, 0x10) 13:46:29 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:29 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x1000000]}, 0x48) 13:46:29 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x2000, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x2, &(0x7f00000000c0)='/\x00'}, 0x30) fcntl$setown(r0, 0x8, r2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x40, 0x800) 13:46:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x200014e0}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x5}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x88}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r1, 0xff, 0x400, 0x401, 0x1, 0xb8, 0x2, 0x1, {r2, @in={{0x2, 0x4e23, @loopback}}, 0x6, 0x5, 0x8, 0x3, 0x100000001}}, &(0x7f0000000340)=0xb0) setrlimit(0x3, &(0x7f0000000080)) stat(0x0, 0x0) r3 = memfd_create(0x0, 0x0) r4 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x2, 0xb6, 0x8008, 0x6, 0x5, 0x1, 0x3, 0x9, 0x0}, &(0x7f00000000c0)=0x20) setxattr$security_evm(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000400)=@v2={0x0, 0x2, 0x1, 0xfffffffffffffe00, 0x5b, "e2f9ab319d92c9766c8984c2602e75b54ca0b24ba2f59e59e8ff30f8674147d3ce0ab217671535aecdabf9a12c985b5ef0885893788afd6082126b307e0e4b59fc3539ab59d01830d6f06e4fda88d4d7d3fba31a1553f68aad2e7b"}, 0x65, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000100)={r5, 0x8}, &(0x7f0000000480)=0x7814fb5409593c85) 13:46:29 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x2000000]}, 0x48) 13:46:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xffffff91]}, 0x10) 13:46:30 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x38}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xab1, 0x181000) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) 13:46:30 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x3f000000]}, 0x48) 13:46:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x1ffffffff, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000100)={r2, r3}) r4 = dup(r0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xd0200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}]}, 0x24}, 0x1, 0x0, 0x0, 0x44010}, 0x4000) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:30 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x2]}, 0x48) 13:46:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x5b}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:30 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000240)=""/73) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x80000) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000100)={@loopback, @remote, @mcast2, 0x4, 0xd1, 0x3f, 0x100, 0x8, 0x2000000, r3}) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:30 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x3f00000000000000]}, 0x48) 13:46:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000000000007feae0666d6c321f14b4df4c009f0000000000000005000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x50}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:31 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001001000", 0x24) 13:46:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)={0x5, 0x80000001}) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xff0f]}, 0x10) 13:46:31 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x200000]}, 0x48) 13:46:31 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x1000000000000]}, 0x48) 13:46:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x4a}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80000001, 0x7, 0x20, 0x8, 0x3, 0x3e, 0xcb, 0x1cf, 0x40, 0x3a2, 0xd114, 0x80, 0x38, 0x1, 0x5, 0x7f, 0x6252}, [{0x6474e557, 0x0, 0xffffffffffffff7f, 0x1, 0x20, 0x8, 0x0, 0x3}], "fe069e67b69af4b953696afa39c1ec2117f2cd1922ebf2d9731443eae009f762358ca4f5497525e537c4323f", [[], [], [], [], []]}, 0x5a4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000009f0000ac10a1b4e1000000000005000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x48) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000100)=0x40) 13:46:31 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000400", 0x24) 13:46:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x400, 0x3ff, 0x3}]}) 13:46:31 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x3f00]}, 0x48) 13:46:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x28}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000200)=0xc) syz_open_procfs(r2, &(0x7f0000000240)='net/route\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000200)={0xf, @raw_data="5264a2287860d91c270979d08ba73e3e7df46c22ed34a8bad940d46c581b44395e53639b81c3b533069d736d6971e222217cb7e8bb8bcdc0ad4f5c252424b01bb5206bf53f5890db27ba6bc10cccccfb7386fe86b44453713c9756a7fe1546407ee3d6d73e2210d152f9b19cc23c9ccff945e08647dd585d6b050f7f2f640c4e3329cfcb6e7cac33d90f7f53b05decc04a46c5d854a79fe88068e0ff09051daeee0e643e03f0e832bbb6170c87ce8547baa5063fabdff53a901701a643af033c1edff729c388532a"}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x8, 0xdc}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)={r1, 0x0, 0x59, "b9d0959944a69de1b8b1cce6b4de50168f948b8cca86ff9aa2620969ff9271c705fc4c978ae1e999344b0bc4d1c5f3e8138f7cb4d1cfd6db9c319dec2f203fdb8cec01d55870f6719c3f5231e4487a609c65881e5900a370ab"}, 0x61) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x10102, 0x0) fcntl$dupfd(r2, 0x0, r0) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x101800, 0x0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:31 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100f0ff", 0x24) 13:46:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x689b9b12]}, 0x10) 13:46:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x30}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:32 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x2000]}, 0x48) 13:46:32 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) 13:46:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="b4000000003600009500000000000000844151eca79a63353fe0b076c82a4cff4614787b16a3971d4d6d8ecfeb5eba0e51ae927c54fbd4211e86e9720000000000000000000027bbaff5100f239f5f000000000000000000000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x4c0000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000200)="fe4d1007d0ed66652ee8832ff8b186a254d4be7e770eca2574ce72f7f3f3a165d4ca86b2e1eb411cfbf96c25b7379b44bc2f94e1db978d261166c0cc7271", &(0x7f0000000240)=""/141}, 0x18) 13:46:32 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x10}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000e8fd007dbdddf9000005000000000000009500000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:32 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x200000000000000]}, 0x48) 13:46:32 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:32 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x4000, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x67}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x162, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x1}, 0xffffffffffffffbf) 13:46:33 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x1000000]}, 0x48) 13:46:33 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000003", 0x24) 13:46:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x900000000000000]}, 0x10) 13:46:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmdt(r1) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0xa}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000240)={0x3, 0x70, 0x0, 0xffffffff80000001, 0x5160, 0x400, 0x0, 0x1, 0x3002, 0x4, 0xfffffffffffffff7, 0x3f, 0x80008000000000, 0x400, 0xc3, 0x8, 0x0, 0x101, 0x80000001, 0x9c22, 0x817, 0xffffffff, 0x7, 0x5, 0x6d42, 0x9, 0xffffffff, 0x825, 0x9, 0x1, 0x1ff, 0x0, 0x70b, 0x7, 0x3, 0xf562, 0x7f, 0x9, 0x0, 0x100000001, 0x1, @perf_bp={&(0x7f0000000200), 0x2}, 0x13802, 0x2, 0x1, 0x0, 0x8, 0x7fff, 0xad}) 13:46:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200000, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'nr0\x00', 0x400}) link(0x0, 0x0) 13:46:33 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x3f000000]}, 0x48) 13:46:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x18}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:33 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000f0", 0x24) 13:46:33 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x3f00]}, 0x48) 13:46:33 executing program 1: r0 = memfd_create(&(0x7f0000000080)='/dev/ppp\x00', 0x5) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000000c0)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r1) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x53}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x91ffffff00000000]}, 0x10) 13:46:34 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:34 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x2]}, 0x48) 13:46:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000200)={{0x6, 0x7f}, {0xff}, 0x7, 0x0, 0x7ff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:34 executing program 1: r0 = syz_open_dev$media(&(0x7f0000001380)='/dev/media#\x00', 0x10000, 0x20500) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000013c0), &(0x7f0000001400)=0x40) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000080)={0x2, 0x6, 0x41, 0xef, 0x8, 0x80, 0x1f3}) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r1) accept$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) fcntl$getflags(r1, 0x0) 13:46:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x46}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x4}, 0xfffffffffffffdda) 13:46:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x20001587}], 0x2) 13:46:34 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x2000]}, 0x48) 13:46:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3a, 0x40000) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:34 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:34 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x100000000000000]}, 0x48) 13:46:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x200000000000000]}, 0x10) 13:46:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) membarrier(0x10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)=0x0) getpgid(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000200)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000280)={r3, 0x16a, 0x30}, 0xc) 13:46:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x7fffefa0}], 0x2) 13:46:35 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x20, 0x80002) recvfrom$unix(r0, &(0x7f0000000340)=""/227, 0xe3, 0x100, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) setrlimit(0x7, &(0x7f00000000c0)) stat(0x0, 0x0) r2 = memfd_create(0x0, 0xfffffffffffdffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200, 0x0) dup(r1) syz_genetlink_get_family_id$ipvs(0x0) write$9p(r2, &(0x7f00000001c0)="0dd3987659608ade9ad33139917cce6ef2b77367682969a7fe84d1e32e5bf05aa1ac54ab0fcf71d680f52bd8eba2aa9331821e99dc1239ea9ea4e72bc8cc1c44fcb26509ec4d281550db8a9ccafe1c9a87200c3dcb054a853f6574b9fe54d0977e908d7334ba05ea6be6f83049523a9b96fe70fc986461affde728f2614f8c1a18ce62a1a56fc2a9cb8b807137221446e613d86399d27f5fcc69e4efd28ae61fe70640d2085477a1480448bafab12690e22278df0c668fa77af78a84d694c80d99512933b88be3b91f3348d59562b263477cf4cf48b2d0af8b", 0xd9) r3 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x6000) shmdt(r3) ioctl$TIOCMGET(r2, 0x5415, &(0x7f00000002c0)) link(0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000180), 0x8) openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x109000, 0x0) 13:46:35 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100ffff", 0x24) 13:46:35 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:46:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x3) 13:46:35 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001009eff", 0x24) 13:46:35 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x2000000]}, 0x48) 13:46:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) link(0x0, 0x0) 13:46:35 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000300", 0x24) 13:46:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x8) 13:46:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x300000000000000]}, 0x10) 13:46:36 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x200000]}, 0x48) 13:46:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b4000000000000009f00000000000000e21121bd009500000000000000000000662699ea97538e56a5723a69c602f424ae1808a50d4d87def680e489fc54fe430364cedff569524902f11a569b4391cf3942a4a5838f901285ee6a97fd35f23c43dcd0dfeae32e575c0862e3e4ee1f8ad71f4f01eac11878dcc3a764435ae1dc7d76e5c3e93897e33a9089c1829c8a7a3cb3322d96d5a41b16f64b64cc3d916807a500cec3038c2ad220ee92dfe0688696a9dbf15193480eb334602d135184036f892ff76760495288af5cbf645382ec40a88a36c7609af044174122199ca68c8507dee348da01cb345e5357e8849ee188391fe4f675"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$peek(0x1, r1, &(0x7f0000000300)) r2 = getpgid(r1) rt_sigqueueinfo(r2, 0x41, &(0x7f0000000180)={0x21, 0x7fff, 0x2df, 0x1f}) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) ftruncate(r0, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000000c0)={[0x0, 0x3a792270, 0x100000001, 0x4, 0xfffffffffffffffe, 0xd54, 0x36, 0x3, 0xde3, 0x4a, 0x5, 0x6, 0xfff, 0x2, 0x800, 0x4], 0x3000, 0x100081}) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x11) 13:46:36 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000200", 0x24) 13:46:36 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x1000000000000]}, 0x48) 13:46:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') fcntl$getown(r0, 0x9) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0xf2}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) connect(r0, &(0x7f0000000040)=@generic={0x9, "c6abee00bde63bff0f4e770c763be7e084d9b9569522b0cf300784e3084606356b6cdacd68350f00e35fca760891d70c8085bbbb3bc6d0c81ccefd2441d3d3d90ab0a58840dbb8a89a989d334fb9f6e36bb15aaa2ad25785bbbec869fb2e7466eee73f898a0f497097e741b0a145b43f1c6aaff02e6487e862364d68224c"}, 0x80) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:36 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000f00", 0x24) 13:46:36 executing program 5: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009f0000000000000005000000010000000000000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) 13:46:36 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x200000000000000]}, 0x48) 13:46:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x18000000]}, 0x10) 13:46:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:36 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:46:36 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100ffff", 0x24) 13:46:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:37 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:37 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x20000000000000]}, 0x48) 13:46:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x2c, 0x0, &(0x7f0000000040)=[@increfs={0x40046304, 0x1}, @decrefs, @release={0x40046306, 0x4}, @acquire={0x40046305, 0x3}, @exit_looper, @exit_looper, @exit_looper], 0x12, 0x0, &(0x7f0000000080)="e5cc93a141b77e366481b60a233fbe834966"}) readv(r0, &(0x7f0000000040), 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000100)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x58, 0x0, &(0x7f0000000280)=[@increfs_done={0x40106308, r1, 0x1}, @transaction={0x40406300, {0x2, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x68, 0x8, &(0x7f00000001c0)=[@ptr={0x70742a85, 0x1, &(0x7f0000000140), 0x1, 0x1, 0x7}, @fd={0x66642a85, 0x0, r0, 0x0, 0x2}, @ptr={0x70742a85, 0x0, &(0x7f0000000180), 0x1, 0x0, 0x2b}], &(0x7f0000000240)=[0x38]}}], 0x62, 0x0, &(0x7f0000000300)="405d2a16ce9a0a6d5a289c9b23b7e8999ff983d456e581b9cdb3fdf063b0f94acaed1ea2be3c1603ca388004e9f48a951cb1ba4d948e2e67a024194f83328db1f3e060acc995da20de0bb2d22acbbbb8b46e46f781785b47fc9acf72526e5a4b9fb1"}) 13:46:37 executing program 1: getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0}, &(0x7f0000000340)=0xffc0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) getgroups(0x2, &(0x7f0000000500)=[0xee00, 0xee01]) r6 = getegid() getresgid(&(0x7f0000000540)=0x0, &(0x7f0000000580), &(0x7f00000005c0)) r8 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) r13 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {0x1, 0x5}, [{0x2, 0x1, r0}, {0x2, 0x4, r1}, {0x2, 0x0, r2}, {0x2, 0x1, r3}], {0x4, 0x2}, [{0x8, 0xb832190d55632bcb, r4}, {0x8, 0x7, r5}, {0x8, 0x6, r6}, {0x8, 0x2, r7}, {0x8, 0x4, r8}, {0x8, 0x7, r9}, {0x8, 0x0, r10}, {0x8, 0x5, r11}, {0x8, 0x2, r12}, {0x8, 0x0, r13}], {0x10, 0x2}, {0x20, 0x1}}, 0x94, 0x3) r14 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r15 = memfd_create(0x0, 0x0) r16 = inotify_add_watch(r15, &(0x7f00000000c0)='./file0\x00', 0x5100080e) inotify_rm_watch(r14, r16) ioctl$TCGETS(r15, 0x5401, &(0x7f0000000280)) dup(r14) syz_genetlink_get_family_id$ipvs(0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0xb5, 0x400, 0x80, 0x20, 0x0, 0xfffffffffffffffa, 0x2200, 0x8, 0x433a, 0x6, 0x400000, 0x1, 0x1916, 0x7, 0x200, 0x1, 0x4, 0x7, 0x3, 0x65da, 0xe00000, 0x74, 0xfffffffffffffff8, 0x7fffffff, 0x0, 0x2, 0x2, 0x10000, 0xffffffffffff2229, 0xebb, 0x4, 0x3ff, 0x3, 0x400, 0x9, 0x20, 0x0, 0xfffffffffffffeff, 0x3, @perf_bp={&(0x7f0000000100), 0x8}, 0x11200, 0x1, 0x7f, 0x9, 0x7, 0x0, 0x3}, 0xffffffffffffff9c, 0x2, r14, 0x0) link(0x0, 0x0) 13:46:37 executing program 5: r0 = memfd_create(&(0x7f0000000240)='/dev/ppp\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000380)={@dev={0xfe, 0x80, [], 0xc}, r1}, 0x14) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000, 0x0) r3 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x8) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b400001d000000009f00000000000000050000080000000095000000d90f2506"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) 13:46:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0xa000000]}, 0x10) 13:46:37 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:37 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:46:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)={0xfffffffffffffffc, 0xff}) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:37 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200000, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000200)={0x4, {0x2, 0x7fff}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r1 = memfd_create(&(0x7f0000000040)='proc\x00', 0x4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x7, 0x4) 13:46:37 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:46:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000009f0000000000000005000000000000009514000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000081", 0x24) 13:46:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)=0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r0, 0x0, 0x3, &(0x7f00000003c0)='\\@\x00'}, 0x30) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() r7 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getgroups(0x4, &(0x7f0000000640)=[0xee01, 0x0, 0x0, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f00000007c0)=0xe8) r12 = getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000003b40)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000c00)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0, 0x0}, &(0x7f0000000d80)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000dc0)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000e00)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000f00)=0xe8) fstat(r0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000fc0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001000)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000001100)=0xe8) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001200)=0x0) lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r25 = fcntl$getown(r0, 0x9) r26 = getuid() r27 = getegid() r28 = getpid() r29 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001d80)={0x0, 0x0, 0x0}, &(0x7f0000001dc0)=0xc) r31 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001e00)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getgroups(0x4, &(0x7f0000001f40)=[0xee00, 0xee01, 0x0, 0xffffffffffffffff]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000032c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003300)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003400)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003440)={0x0, 0x0, 0x0}, &(0x7f0000003480)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000034c0)=0x0) getresuid(&(0x7f0000003500), &(0x7f0000003540), &(0x7f0000003580)=0x0) getresgid(&(0x7f00000035c0), &(0x7f0000003600), &(0x7f0000003640)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003680)=0x0) r41 = geteuid() fstat(r0, &(0x7f00000036c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000003840)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d6031146f10b0d0e25397fd7d3ee63fa0a4653e325bc5b38bdd0d512218f6928d2f3129064f5e32a29b6cadacb585e6fb48ec9aedb01d57e7f7f625f6b103b8281153f55e6ea02a8da4b4d59e643c037946a2288406a39ff944d38af09d3b3b87a3c1debbf5bcd002c1188298c96e131c698aaaf883b1f8ebee30d86bb55a6e8274ba51bb2f8da733128336dbe540c8b1844c9205e2937e84160ac0b7ef224ea9cbe65decc11e657b003053222751b325e8aee67d51269c59b235ea65a08b0882480575ab35ddd1a9e9b8c748102c3fd", 0xd0}], 0x1, &(0x7f0000000800)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}], 0xe8, 0x80}, {&(0x7f0000000900)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000980)="9f8fffd4b897ec25e1e04625993968524b3dffc93db6ac2f524482c7d29f3c90d044cff9ada64f6fb163486f7a432714d5638615e40754fe28cb394159c88a85cdfb7eae3e7a682ce46d87b78fc05988f8988c599962bb5a2faa4371a05a3faea9f34891cf390d22f8ae959ee842e0afc8c6d575cb222c06a4984595d4f20e39adf2a51fc7820bc9168103d9f143ed836b80480d301905c53e32c9b48d836f87f3bbdb440c1d6c6a9b4c86c06037bce81d914bcaf1140f90d6514aa21327484f662f402b2235f37ba5434909fba8caeed79736522c52d568b714", 0xda}, {&(0x7f0000000a80)="d184a0e2d62e215b37bcdeb030bcc1c94f0f396952508a90c2620ed577cf58dbe8af94f347a0474e655e28fa4a567e7b67803a1134f9215cf9012525762e7fd4a20c1c0bc6791cb4fd127a307e560af15e361ec297dd79a936e26ffd704656f63599cdfcfcae2b3196ff2e7159f36caf181d9711e64047cf9da3a01526ce34c20eb27d729457f2386573a2b2e0ad48a3c3", 0x91}, {&(0x7f0000000b40)}], 0x3, &(0x7f00000016c0)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r22, r23, r24}], 0x138, 0x40}, {&(0x7f0000001380)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001800)="c3f54fa65f5804f52d9e57e86f39a27b74a929f2bc2610baf9dfbbc384805b4b676d2b61febb725e95a8e594c6e634a780e7e053a09fb1022add4714fdda31034d386c5820f3be032b34247da7d55b848d9a95dbc2cdb50785a4648b2f341e370df55d9a94f983ce2fd9f734847aeb75a8e857c9f84b66432f83a49a5a5b4ee29c932678ccafc397d521c8b3be8e4c4bd4ea8fae1ed071503d9a647bf51e64b78da9de8a7483cb957c7651670ecfb4ad1a1a4911b36286906dbdd7bbb9b452bffa69cbd69f504a307e67ebfeedaea7956268064ee337113846182236a2be818d69d323f51ba46262a97910d2", 0xec}, {&(0x7f0000001900)="3287aff9ac3ee6843ced839f8d334a3ce93629d206c126310d09873ef163518e4bc7aca5e499a7f84c4492fc7fe3b98f20f6dc2a6404f01f3217f2e0e1e8fbaeda200a79476cc5358e1392ba5fc4443c3f99de1efe15377d2bab61bfb7126d2187fa83d139541da2ea34c13352ee01c8c734a5b82ceca90efdd6224804a0550352fa1ba8da0d29507507944d99e6652833186bb8b2ab00c89c3cd5ce1b82ee2e4226e0deb6b1b9f6f06754a1d2d501c21e552adf61e576179c4c9ce52b12759b99bb9f453f80e919", 0xc8}, {&(0x7f0000001400)="cb221012d742c63569a02f65c2cf27e41f8474fc67a305c36db4c4c05a4acc2b81e205a3ae9f16d6d9e41b14ae2a91f9f7bf98805be77e70dc2778a3f0beae4c49adbd29f9600c106f9f578a4725a73ea1085932e46e", 0x56}, {&(0x7f00000015c0)="900527b284e9769e9b4d56a0cf09c629adb6a6cbdb7cff8f78b76827ba7afd20378f146d466c816b38ef29f08c4f2c678a9e86578172c216d4dfecb116016636f2df99b042068eee9a750559e57d4a2931915913d0888baaa38b917c3d715d987452fc6407dc92e5cd84fba16ac0257ca7967f87e51eec2913801a0da81bf8bf59525d02f37a83e9ccf6b4f27c7a9238ffaa6fbc22248bd148a730854fb8ea05a22f9b7d9d40b1271560", 0xaa}, {&(0x7f0000001a00)="8f183ad93803b8481cc78a509cfb877f2b1dff61ec95a9f252cb7e7ae0c2de04372b3b396488572f6b95de3f7051ee828aa684f7b58c65ecc5f674edddfc37e8905dfa50aa43396d3400b4587c72d7137a55222202dd1bb5e27ff95abcacf2dfd8c4f949e1505731ecd5748c49f5eb033810150de5c8df12f49f35323739f6908e9ef33bdbf17617bf7d549ba5b85c773c48d9a67022c344051250491e1cd5e83fd36cf71811a7b9ca", 0xa9}], 0x5, 0x0, 0x0, 0x8000}, {&(0x7f0000001b40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001d40)=[{&(0x7f0000001bc0)="850b8d5d1bb273199bc29c65722e7cfabd73cec832d6c1743a6ce96ccb0e9a78d94cee58bc59a68739f7d590cf88ae543a3afb39173cecff4ccc8c1d4d59f1e358ddc04a70f8baf57117f24c3d9954bf88b5c86a6384a7c437f347028979bfdd6961", 0x62}, {&(0x7f0000001c40)="2fa0ebe3d0aa62b532e5c721e601680e0505e416e2ecf35b79be840c67b440337044ad69076a6ecd28b188aa2187637996f287d59c7b3ac4860ac30022c46a54b49d49e4f65288c4ad429902046d57244ff7a24578be093b9a245c6db77a2ff89402d911f5302293f2710bec5eceb2922074016ac56bdfccb02563092b12c59f186888abe83130b8486b83a61aa97c028ace0ce964721ecb96913068e0cda88cd35ae7bbd0e469a3652357f2fdc3f584d52c703ad251b0d3b99bfd65f663f8b8bf25eedbc4", 0xc5}], 0x2, &(0x7f0000001f80)=[@cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @cred={0x20, 0x1, 0x2, r31, r32, r33}], 0x60, 0x4000}, {&(0x7f0000002000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003280)=[{&(0x7f0000002080)="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", 0x1000}, {&(0x7f0000003080)="b49c793adc9615b6b49eaa3c5bb634e8410c82a18a97a000d77fb0abf3908a847d62a7fdab70a2675995354f48dff7a1160e82e17ca96a3cc528d83eafb05fae6a922cf70d7912eae015c1efaeebae29afd4dbeab47acc7ce2551040399d06049e68f9ea224cea673e4e01c283cecd223f31f731dc31e5b73e7eaefed5f052dadf5cff431c297f7cc064fcf31c358951e77ed2d3b85388ed07fdaa91d9cd275eb40a89af2db9b8dc65d94417be8afaeb135bf281300ed2b93ace8fe4a08817ccf9eb5a95", 0xc4}, {&(0x7f0000003180)="bae7a2dfea4733ef541a8891be02bbc584f9c0fe950f34dd0d7bfc7b998696f745ff93bcaeea165f80677844d7b1839fe80ede939dee33f5f96e1475cba58915e3b9b32912cf4ea776c7fdc16232c73beb34eebf235f62042c6387be8b479f0a5232a7ebe104e9160082e1f8231d3ae7f28d7fb1a715c22235092b2526f05a6cac4912e0adc574d81173a9d6988d3c4af70780373c61f42b12593ef2bf065154a923170e2c95c7f729fed7f4e5a857d5de4bc539a5ae5e3f880770c769", 0xbd}, {&(0x7f0000003240)="4213c424a982d966adf2adce2ee03327f260b2be48c3cd510ec3a6aeae75b29e58948b2ac52ccb", 0x27}], 0x4, &(0x7f0000003740)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00000000200000000000000001fbffff01000000", @ANYRES32=r34, @ANYRES32=r35, @ANYRES32=r36, @ANYBLOB="0000000028000000002000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r37, @ANYRES32=r38, @ANYRES32=r39, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r40, @ANYRES32=r41, @ANYRES32=r42, @ANYBLOB='\x00\x00\x00\x00'], 0xd8, 0x80}], 0x5, 0x800) 13:46:38 executing program 1: setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = getpgrp(0xffffffffffffffff) prlimit64(r2, 0xb, &(0x7f0000000680)={0x101, 0x227b21a1}, &(0x7f00000006c0)) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000580)={0xfc, ""/252}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000700)=0x3) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x470, 0x0, 0x248, 0x248, 0x388, 0x388, 0x388, 0x4, &(0x7f0000000040), {[{{@arp={@remote, @loopback, 0xffffffff, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff]}, @mac=@local, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x20, 0x80, 0x3f, 0x1, 0x0, 0x80000000, 'vlan0\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x100}, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0xfffffffe0}}}, {{@uncond, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "ffe670f3614c8688f59332a362d175fd207d2161823a4ca2d2a0166606b9"}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev={[], 0x14}, @remote, @remote}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000540)=0x6, 0x4) 13:46:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100f000", 0x24) 13:46:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x18, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="5900000712591f3e9ae48d684c299fd7f6af660ff8285840030000003710000000000000000080000000000000e8d40af081d745d1519a3dcca32d2051b43f06a914265abe8f8276cfe87462347527701c4ab13e4cd65680715c0d5a854f0921"], 0xc9, 0x0, &(0x7f0000000080)="e85acfc4d068ac6c175ed0612df92125f4af5dfb6fac6502cd280d443977aab1a24e4591fe851502c7a209fee5848a0a55c66d58050d6c42fff18bc193c90d7667635fa30ce095c045a6099dd4b522bab93bb50271e71153b5d937d429a16215c8e1f32d44151396595aefd3ef6df5f36fa98ad2a81c021675a52b37008a6f50167a6b8f27ed56d51cf4f7c340f5dd68281c60f984d314b5c7ead421cd5784c9f2da3c3d4cae26282a44a6db0981bdb0429e80d585fe4c99c84832f3fc7b15b83118f1ea25883f5e03"}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000001c0)) ioctl$TIOCNXCL(r0, 0x540d) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x202, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) socket$inet6_udp(0xa, 0x2, 0x0) 13:46:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b4000000001800009f00000000000000050000000000000095000000000000006f223e2000efa89f0436e824b9cc68f115142d404d121e54c292652c4d94c492446e9be4cd88d22aaaa6920b2fa294cc56eb8f392302e8742d0bdc7b393c18c6056aacfdc52973f399df934ee89155a793b8a441fcfdd16ee0837be07eab8ef1cf6737bf85ea6adc04b930f517a694fbd54027f1973e3e68083072e3fae2e91f0b3fb657b95382cc248adef486ca705ee628cfff68366a"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:38 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:38 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:46:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x91ffffff]}, 0x10) 13:46:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001003c94", 0x24) 13:46:38 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x7fff, 0x8, 0x7fffffff, 0x100000001, 0xe2}) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:38 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:46:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x3, 0x0, 0x1}) 13:46:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, &(0x7f0000000200)=@rc, &(0x7f0000000000)=0x80, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x4000, 0x1}) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:39 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:39 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x20008000) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x45, 0x3, 0x6}}, 0x14) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write$P9_RMKDIR(r0, &(0x7f0000000180)={0x14, 0x49, 0x1, {0x1, 0x1, 0x4}}, 0x14) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) 13:46:39 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:46:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="b40000000000199aa39f0000000000000500000000000000950000000000000020f6bb67eba6fe848fd6d182b1e721623da22a8772240edcc91c42f7236fd596ab6486dd835043f7203e742681ae3bfefccc73bfdf762455c549ce823b3b6902011eeb6286527bf6887c6cc7809d5143287ec55082a884bafac676a01c73ee04d2ee66bac87bb4e06df2a520e6abb009c23f89dc73fe06516b648adf00b53ee721a8a1c9fc672ac172af9c1ef6e0dc420763990da6a80ba135ae3db81ac5df65023929eba4166aaf0bae1935fb47709924d96bc39a6cf59b03e1cb4c45c090edc8a545b05aec1621a41b82"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x5]}, 0x10) 13:46:39 executing program 2: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/ip_vs_stats\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) epoll_pwait(r1, &(0x7f0000000100)=[{}, {}, {}], 0x3, 0x1247, &(0x7f0000000140)={0x5}, 0x8) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000080)={0x9, 0x7, 0x80000000, 0x2, 0x1000, 0x400, 0xc}) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x3, 0xe, 0x2, "a344266c3d550eb265bcca71d969917d318af219be9c24d0dfa72ed696006314", 0x38303553}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0xe010, 0x0) 13:46:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x400, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000040)={0x0, 0x100, 0xc9da, 0x9, 0x18}) link(0x0, 0x0) 13:46:39 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:39 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:46:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x1}, 0x48) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000200)={0x1, 0x3f, {0x7f, 0x6, 0x1ff, 0x1ff}}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000240), &(0x7f0000000280)=0x4) 13:46:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) link(0x0, 0x0) 13:46:39 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x2]}, 0x48) 13:46:39 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0xfdb0) 13:46:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e24, @broadcast}}, 0xffffffffffffffff, 0x8, 0x5, 0x3, 0x1ff}, &(0x7f0000000180)=0x98) 13:46:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x80000007, &(0x7f0000000000)={0x0, 0x64}) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e22, 0x6, @mcast2, 0x100000}, {0xa, 0x4e20, 0x100000001, @mcast2, 0xdd7}, 0xfffffffffffffffd, [0x3ff, 0x7, 0x100000001, 0xecd6, 0x3, 0x20, 0x1, 0x2]}, 0x5c) 13:46:40 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:40 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:46:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") unshare(0x400) r1 = socket$inet_sctp(0x2, 0x800000000803, 0x84) getsockopt$sock_buf(r1, 0x1, 0x200000000000001f, &(0x7f00000026c0)=""/4096, &(0x7f0000001080)=0xffffffffffffffd7) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) connect$vsock_dgram(r2, &(0x7f0000000040)={0x28, 0x0, 0x0, @host}, 0x10) 13:46:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x900]}, 0x10) 13:46:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0xf8, 0xc00) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000004c0)={'vcan0\x00', r2}) connect(r0, &(0x7f0000000600)=@rc={0x1f, {0x8, 0x2, 0xfffffffffffffbff, 0x1, 0x6}, 0x9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000c89e4ba0009f0000000000000005000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3}, 0x48) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x100) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) ioctl$VIDIOC_RESERVED(r4, 0x5601, 0x0) 13:46:40 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x185180, 0x0) openat$cgroup_int(r0, &(0x7f0000000200)='io.max\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000240)) lsetxattr$security_smack_transmute(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000500)='TRUE', 0x4, 0x1) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000280)=0x10001, 0x4) setrlimit(0xffffffffffffffff, &(0x7f0000000000)={0x3b0}) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000340)={0xa, @win={{0x8001, 0x4, 0x8, 0x62}, 0x0, 0x9, &(0x7f00000002c0)={{0x101, 0x2, 0x0, 0x1}}, 0x9, &(0x7f0000000300)="21e6ed321ac5211c1075c9b7cfb8cd63be7c2fa50f758ac95fce3b239b7d68ccdef88263047e2dbb6deb30", 0x7}}) stat(0x0, 0x0) r2 = msgget$private(0x0, 0x2) msgrcv(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0e60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xf9, 0x2, 0x1000) memfd_create(0x0, 0x0) dup(r1) syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0xffffffffffff8266, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000440), 0x4) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:40 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:46:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffffff8, 0x2000) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000200)={0x1, 0xfffffffffffffffa, {0x7, 0x2, 0x0, 0x101}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0xc}, @broadcast, 0x0, 0x3, [@dev={0xac, 0x14, 0x14, 0x13}, @multicast2, @empty]}, 0x1c) accept4$unix(r0, &(0x7f0000000280), &(0x7f0000000300)=0x6e, 0x800) 13:46:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x1}, &(0x7f0000000100)=0x8) 13:46:40 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000003", 0x24) 13:46:40 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000800", 0x24) 13:46:40 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000001c0)={0x3, 0xfffffffffffffffd, @start={0x101}}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x9, 0x41) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/sctp\x00') readv(r3, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:40 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x3f00]}, 0x48) 13:46:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000200)=@rc={0x1f, {0x1, 0x1, 0x6000000000, 0x8000, 0x163, 0x100000001}, 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000280)="e8da019949a230e316ea766a91ab5016694f36ae09dbf4d3c9ac179ee4d310fde52a12a1131b07b1c9fce79f36206006000541d67a127030bccca46f2716b816fed54f493a7288792dee6dadcf2413943deceb5be5c26684764af34d1a2c042e4e34ba2a4e2bc6b8043dd2120e988a11147d6b06275aeb525f756c9ee47d5bb097", 0x81}, {&(0x7f0000000340)="6601534817cc71c1f58b4a0fc8bbab562a1d36727a46058a8ac21f8a4b6e2b00c74ec426ab5c1d5f8a5150e8f2e4e0241f8d2243a75ce15a60e799affc7c8b1945cb2988b7e9e9669e4308c91e8412f09a4ad4dbba92997ebb561c7ce7dfa44ebd6cb83595d7cc6b5f5337623fedbeb054511eaef42618f6dbe31677fadc077b00ebe35c69d39c1c658a0250f2b75d439b9401645e60ba3866a7fa0d13248a875cadbde4e74521df01d0daa07d0a42c0c24cf00065b9ad0011f157c8565ec2225efd20b072d1e696dc9d5d5d695a67d7b43f2370b66e9374e67ade571cd2c0cc0848f3eec2a96b2cf1", 0xe9}, {&(0x7f0000000000)="5f24fb91726f07fafa5dc39986fd77eb3768de1c33db2b11f8fb05d0008fb2f5200a6d11ca9feb6d1d6b72", 0x2b}, {&(0x7f0000000440)="e0f20b45a474f4f64bc90a2813175e9fe1206a04dca184d536ba9952ac496c70f356c1d797204186a48b19081f091027d79852ebd2735321c5b8adb1ae3db618eef3fd7228e6ce6048e1eca1470a161565a5a14304442ec8b8370ca137a56330788829d74f04b834159088907b791579c70e9c8a2efa78a24d3379f11b4216", 0x7f}, {&(0x7f00000004c0)="852afb80a110cd666bc81145c1dd7129380384e6bfb603a8983a4a731b63c2349b60b9396e", 0x25}], 0x5, 0x0, 0x0, 0x4000011}, 0x40001) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:40 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100943c", 0x24) 13:46:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x861a]}, 0x10) 13:46:41 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 13:46:41 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$mouse(&(0x7f00000018c0)='/dev/input/mouse#\x00', 0x200, 0x1010c0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000001900)={0x0, 0xffffffffffff8000, 0x7, 0x12, &(0x7f0000ffb000/0x3000)=nil, 0xfffffffffffffc00}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="1500000065ffffd9e7000008003950323030302e75"], 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f00000017c0)=[{&(0x7f0000000280)="b1cb7053a8845318185b8b18417b85141edff7a189375b7ac114fd762e4362cd2f55252f2bcc4a8d3af76c64bae2f78107d42dddbf7b2dd9040186a603866bd86e16fcd43875a76adc841e73a3c90128b6aea9c9520404d3c228f22cd1cc35a0b014cc44cc92f2ee63942a01c2f6b3186b6d0afc6e91da77bcec69ebdb61af29c38a28a473c6a12b051d6357b9851e8f90aa981b96ca76eb88f80446cc9bdd595909dc5142", 0xa5}, {&(0x7f0000000340)="988065a5a9c652c602215a110e8b8c48b7d334b9270a2c62d22baad1598add22c7439535e499324211fd95ad8f447b49829915653ecc1944a46b30dadd7865e20302bcba4a20daa29e669932885b9e7a878aa4e20eec11ae5ad5b39a9d564e547fb9c33447ca44160f0b324708e7a8c3cf86effffebc59dc30f09fc3aad22a493d6a7f296851ba8e2d5450b6a19bd4458798bb05ebb859e2b970b349119aa73ed1ff0756a7933960f978840e9fd760158847f775e523a9f334fc531dbd494fceddeb3b0a8a71ad560ab4f16ec8a1c9ac88b540736d32e90ada42052b3ef5366691c40c72fb0338487baf5d", 0xeb}, {&(0x7f0000000440)="8b5ad8b6cba00ed273118d02d37fe9f61358d8293f0e5ce20083fb9d0e207f0a0ab0f83ab70a09da3fdbf0d9715fc942a01cd1474faecfa0d13bff5d5aa449fbd7119cb95ed74baa0a58c83bf9154fa012e1b44aab5b271c3e437ca7f0179a947b0e7a3d4d30d6ade20e3dff20d2a0221e4c964ad5cbf8fac46051b02e529463b4be4d9738d16439e98a4e79ffe2c0ed0be11ffd5e", 0x95}, {&(0x7f0000000500)="4da1828272696ba7eee8e518b2cf29697216e59f1a5f641abca43c6995b5bfd1bcd0d331af0c77b5a78f1b6e69343d6039ea2b69cc2c92f2f07870135f39f16a37c8d22c9ddd5518c410e2da61694ded3edcab2fe41c3a132e04a4f41afb5565b4f1de0820c4a66bce3a67176b0ff967dca65f78849610a0ff68def7296e6a10fa2ac036cb2584eec9d580ca5511db9282b197c7e1dab372f96d44223b7900bdf3aa48fad6e0f1a4ba5d093b332a0f7ec995c62701cd6beb27dc2eff11185c693a9a0261568fe0c68c9ad9b99077f70576984d58f83269127f138ee0e3f6f62974e43097102e5e2d6bd61fcb03fcd6255d978cfc8288dc72867c02e2cc1d6b967cfa87e3278f273b378d7b35629de0387af10db35d4fe1d189f2eaa2d2fcef030c107d7ed1a2bb0395442fe04ba4a1d08016a587cc4d63c60a2649dfa3b1fe817648f55db0d5143ab6bfff5f135ef64b4667b872ef47af7f62017b6204caba087b6c30fce685b80e58b69d5ff905b3ae476d629251325f4daa9f396e6e12a332c8d51fe386236d71b587afd66d0e9214032f271454896fd4bca7c1bbd4e08288e98d668935aa7c7d1f82238495a9aceac7ceed4d2515d5270a4b2215ad2e2e47c7444423c3f963f645ff92f9a020ead07bc89dd5e04086f31e64c419c8ed59f78871355b79783d74c3774d46eaedd0350464bea2f6d970ff493d1e6e79d29da8605cf4e6a0cc84b484223661ba18c875ee453680f8772f3a1cecd7269089ba1e7cf699fdcaf7e45ddf042f37d2a9aad212490f9d5172c5da4f2c8f04ac439e6631d2c7d4da61b0188557be82b107eae80cc4c2f54070c21f1cd5bc5e73329443ecc8ea2adc5bef9e68471a2e322d332c1e600b4b5b4ba074b3941f3315b8d76f7f1b9e129ec9e706ddc50ea3a2ab72dc1cf33eec0f19165ee9269a0f105e78c9dcd65bc4f1a9a233e49f81232522cdc16595bc4aa570bdaa82c3763e7feb0e60dca6d60d12cb81a36271628e25a7960aee26bcc9b9d49a625e24f6bc680a30e5fa3bff68fb642e50c89e2f1a2aa480dca9203917362dea36e2079989bfebaac4e04d5e9582e77d2a5c537851998851663d2684f6b40cb8ab90b221477916810310f1a68d10d93dbbd4f6a5689d878e31b7c94f9130340a63706de4132ec9d21fb642e11fccaf9f31b06ff792018268fbfdbdce4a5db6d33794873a8b9f1c9d67e293a8e98468acf9ac970b1ffb546b0e35f97c477abe2c799052eaed2a2230403d9cdfdded164e35b9e2756ad7b789588625a36a5f018ff22c27a4b154a12de9241251efc12454cd1ee885ae6d06a9be3195494b0ca1290435600286ede02a482d9691a3cf5d7f15601f227043339a56ce3f38274071192b439ce0d0a0c9da5edf0e0943ed27454fea0efa63cbfb1e3414224f53f26b38ebf78a5a04faac2c69690fa96ec2b2aa09b8068c2f326bd67292cd9a84aa580f87767e692680c7d019aa824a48f01702fdaa23acc16864e7fccbadc687cd96cc5c20990f6e55f77f17a3ec24c8096da9cedabeb3cf00ffffd68375e4d7f93caee96ecfde70659e2ac958f2a36f17e16a5859cae9f5a368928bac1914a160b4a2c8e583be9ba9b673e704cef7473f5f1b0b7dc08abc96d5f443894c39304fb3f09d6148e721ae761dba2a4efa7dcc10191449eba956b93f8939aee607925f834370a3db46f9e0014a96871bc025a6fc3f914c508e34b3210c49a939e1ecee6fd233aa805338291ba319716c51d6f02877f7f0523f837c13a5f6521efa195c03862f75851d0bc243c4fa0b6fe741fd949e1d8b79ad7f26c76d91fe26594fdf7f5c2ccc2f440c1b40ccb21868dbad502bfc71f9d90c8fcd16d2be3f674b041c8a7a6121a1df15cc9849e238cb16c2ebfbe795fa4fb33912d5d32838dc045af5f4a48bd5744773baabc3df24e20a67bf76670b3ce62077f9b70468f0dde8587bcf8cfb0b7b12620c256ba27d52a6247a9e6f77be8beb5c2338e82ab05360287b4ac28c7962d4b98568f4ab856a6c05e0eee4a10c59dbe9a417721b78f9995734a047ae9b8476497256a66ccc56d08cfb0c7df008aefa424e4b107f9003633be4d275d0e4363db956e4614ae58816cf033ca58b151feb2befb3732a3f15d7b0d87f1aa41f95049425a9fcca09a40dbb3db1d1a417fb338b116b02f69054bbf4e22799d47d8dff9a5f51109b288fc929ad5e95bd4cefa0873fb5979af1508f1b1e69563f0ddaaaad58a774b1cc49aa392c61d965701c05ab10eacd5d04881e082d24e7de1f5553aee53f3f3d38e14bc60da0fd5d9162a379df901d55adbf66b5bfcffedd8aa60ca13fc9d0afeb3a25d8707ecd371eb73c7ac6f321375044d974bb46fa9011cdfa4153a24f8b17d51c6a9624189d4a2d31d4b9853f78206a4265428fd85370eac94087cee0cb0d1b68b1389ff8a079847919b104e25386e1f830409dd46373c74aa3f9c133144e874aa39affdef3916ff3d38e4b27ea961fb86682f4da07d4fd4199a10c6d9e783992a4c0f1936490c8ebbdd3aee2abb111366d3f8121747f5ef5138d5b028a11507a61f022b8e5240cc2b3bb6c9bb9d4097cb8987f91403e9f27caa3e3cf090743278043966147924d5d26c1fd9ec7d0c762073cb2904fea8d27c7efd5e5d8cdebc91c9dcc417258ccd57a7553d13e6391312a466acdca8dd56ebfbaab4335bd886cb6e0bc40f8b79735dab711881017363e4162eadfefd8fecd09130fd55a026706c570a2dbf5dfc4070d1727cb87681b30125e3ab0ee1191a1ec807c64645a2bd202dcaa9a143a9062c3f88c37d0a8f674e480c59a031b8be7863e1da75fa52c0573cfb01593ef5f236ddbe1ebe368aeafc6ee5c8b58566528793c83f6ad55032599546795e660afe6e5b01428e5971290c74408a02fe806115e147a1baf01819d3179bd712a237aa1435f9dda928e758b5e3465f39d1c61c519971cb78041ebd97ff43e0ba75f29ca167d160d0f1edff3ffff5e3b80dd97e182cfbec8a76bdd82a0b80e56a84b1e193933f1cc752d88dfab4336a1bfff576735cc85eef9ce2dbbde89dc2819b92d5dae75514635864da48a2037fc4ed261448d812cc35559c1706aa33c504f0bdda9def3e06dd9e2217034ea5781fb4a3372ed4c57640469b4e23db25c984150b50b807c9dd21123c1e092d1db8824ba4732a18cc93c220bcdcee4624efcb9bb5805ae796054f7a37fa1c0bac9402661e9a177102b6d02b9841946eb06f9d685873ae2fe7cfc1718986868282cbb05d12af06eb491df3501ffc3c9663ca819b4621fc362f6cda190fab2decf4e20e5f26d1e9a0492b22919d919255d1259840c10355464bf074da0fa515b73ce45dfa5a0c36c23ebb58648b183b4f193c2cb49c954b531b26979b8a14bc221da83d6074131a694357cdec5a7eacfcefb1cc6ccc10a22a2673fc3034ae5535d1a1c66b9e1f80091455a4e78adcde821827e8e9c3087068b20f3931cbcc8ad1d348c3add33a598b4d9b93bc4ac3d0d012cc9d9c720ade8411d95c8959adf28a780262517bf74c52cc0d3909a8f78c14e12d43fbcf021e9b315d953594a0f31cf423dd5b7886119bd4eba575faa45116395be20eb69f6b99edbb2d61ee99778809bf50b672773ba5e62e05642ea9a4512c241f59633ede8fbeb62872b76e3448f003fc4a49ce85ee0095673ce966d818ee5e20f4415dafa7cf0761ad8c99f0781e96bafea358971d85b6c5d51c593a5c309b5a68e8c8573804bd14c98d978c7bc91c3abd15b2768304c616bfb56d3c57f9204a650a98491436fc70a5351051e35c199392891dba23f59e881aedcc9da9268c17b8f84f876179f54792d6caccd465c025b257eb257c453c75e719f5c80bb73ddd758f66cd88a804fe6c4a4588043a2ebc9302e55796d2f1763f650786804cf9ae053746ee91773f659de3e1a99f84a61a6a1017da316766a3315c9b5b36e1f9248b3616655f92b289d78cfdf2f68e59109535e56431003df1c8b002649d418dc45c172a7f05831740318237c6c209be7fc3dc8d57ab2380d6d55fa5a46928bb9fb1daa4a62be3501faf36f57274bcf0b43f9e68cea25eaf3309ff10f8a0e7bc0f137251787eed47284f5ba2dbcd27f0e87d07efa39056081d34b5ba2de0465aa780df11e895ffdedf265ad34a3139f77f6136f448924f698e1e36c7663318f46a6495de63f6147a7887bff383da8d748671c53f01b62cc259c2ab1209d6008274c247a33e40a2dcc8000bd617e5a3e4ae5198a9d010e075e158eaf73267c6069b88b3b51f8e1adf31aaddba4d583203553c14b75ff2e72c16e06ab263b1b77d9fdd6280708c3090a87efdd76d2e8fa5a6f7c58fa1b2fb367ed49b6dce05b32be582901469760a5cc75b66a28cec9fa3ef3053538d4b12cc10e9391e4ca7ff4dba3ec5fb2888f8b8b67b8652b2a88cf6171837fc308b0798d60a43881babd09eff7acf09f2bc6d8c111193769902503872718abe076eace2bb56f90ff407e1475a5bbbe67f62567e8ad492fa031df44294f14f64fff93b570bb88d32fc388f5afbc0cee69c0799b1171ab8374f84d9c3e30dcd2cfbe9bcea4f84d0fa5fb465e7dd6f3a1c671673319bd75a279dd2f24b3f9a74ce363306b99c7d7d482e0115fe49b8e9d1ce170d512b26694cda9e81599914a66dd9152c92ea1f777b5363e459cc5d8bac28d9f82ebeedab3796c981ed2fe7b8980cb5c8b687c264c5e3146c5d2b266e930859b7e9a2c91a136208347fbef877f7bb4c77809c2c62ed32d9d63db9168731f4f47a7859f4dad2adc15e09b7ca46a02c8fff9bea1306d1899491a1814d2ead4bd34d916062f8468e99f4e1242550333b02ea6f44c1140803ea90249489ac09c38a85ed243d9ebfc20dc6510b26e9038192e32d53da8a47632bd993f46fa5e580d3494b0632bdffb7a929439a9a398d88fab6ccbb062bb0d82740d8e7555f45abd920d539ab27bcb787a55e54e55eedbccd2e907651918817d42d99cc1eac5d542611e5eff750c7796808856f80ad22741d709b7f51fdcf7ff382ebce3ee30a63fd8f951aaa12fb55e0e87acb818c8d6245ac41f15a0fb50d975c06af779af6d8af9280c693987cbb97091aaeb3d03ea3f8cfa9328db05c8b380ecff872ad9785c61ba92b79d6b04564ed3b79dddde734ec108168c4b73e84553eedd72a5ab72c6d20a80ae7ea7400094a389946ccd0504719cc660bc0c65c41c5ea73c449b9a9356fa1cabb73a0e4a38e7f64e7ed2944d64696d65d4bdb67b15b709fd112119c7a5ba9a8da3d3cffe011e0ac2c5be670987c1f5549cac9ab884818be69942c39f676c7ee5e7cc4b3386fb35a621356b448cbdc3c22ab2bc4a8cf0fba00cbce40134ba965195ba4a61c16b29b0b739c468f8d1dae6d2a5cfff8c2f4562e67393a0dce87a627993d5459c775f98b5beef410d7df29fba462bfcbc8c5e9f5adf3a3d58738295b819d87ffe29b911435c139ef693f0e43dbb68dc19552c398959e45b149eacf9bca9afb0c91a7d4aed086aca258f5c892f53a2439beb998f579f6c12d0acf7f03fc4e0816326ed59fc2577ce523b86a7faddd987c66656f07e9d52a1820bc85802f32ce80b184d2fbcbf4f620b5fbce3d98a68acae14785fc29d22dcf5ea09ba13fe9acb5cb134ad6714e919c1635bcafbbb6d18181a33ddad9a7c9be39ec724d905963a0797c4e0e9ccf2f2465cb98f26680af536cf44cf67bd6e13a35e019cad27d398b09da26a3144d6133409f83e", 0x1000}, {&(0x7f0000001500)="08fa01b2230f1047f9fda83505c6cd1f6293c5d8e8fbbf033e0da899dd1d861549522aedb48c0f7b814e6017a51a85bea651a2dab38d36ac0d275fd99cad39971a599aeaa4d7199f74bc549266f0b451e8656f4d360bb09abc65cc94cbd6b4a9e8de85fd6c7a934743c37739fdb9e4b1b0cb47a3b1582dc3c6d7f0c297ec909e5541ce1e66096ab071f75ea4bf2fc5964918715293f468dcdf9b1634a45ecaa6add50b9f7808341cb01c9e175a4edee0b67f66b1553d35ebe3e50b77552efb44eeb93a23d959dadabc234212da713cbc02bca2ae9fabb29fed37aafe84303ec9b298afd3087b846049ec6207", 0xec}, {&(0x7f0000001600)="b343dc2c1ec2a2fc0ad37d10c4d65a64a3e850b99bb48b4b0c7bcece979b12c509ee2705c478e2771acebaf2fdd2b16186a4e41f", 0x34}, {&(0x7f0000001640)="bf5e6aab8b8e81aa69ba9b4588d10eeaf754083f12234157d6d04b964d42e7707237e0c7beb16e56f89a59", 0x2b}, {&(0x7f0000001680)="a2de9b829846963b640bbfb4dd18aad234aa9e5077a5df2e0d5facf9455f3d1eb32a6ad454c0b616f343e4e06d3c29e6fe91936b1b3a59857ab1c40f9c7ffadf62c31c08a604e842e27a97", 0x4b}, {&(0x7f0000001700)="44aadbedd8c4f17e4710f04d0d7a70c853568d8172fe4240782846adf1227ca119f508f4a947bc90dcfcb6190e7da815a79320ffd1a92cf8a9e90cb84ac3836913932d3dfd5421f8000200775d27d5cbe6de8fc8cbe66ca8a945e1fa32e16157558be05fc4d800be86cbd7d5f52fff99846703c87564cddf2a98935780de22085ae271135e12fd6d8217d7d7489c8e3ba8ff963e1eb1a4c7641bb4eab45e", 0x9e}], 0x9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001940)=ANY=[@ANYBLOB="b4000000000000009f000000000000000500000000009500b7742c46856be9c0e1a7000b000013e7a5f6f559f5c5bfd120c8b5c200000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readahead(r0, 0xdd4a, 0x8001f) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'net/ip_tables_targets\x00'}, {0x20, 'net/ip_tables_targets\x00'}], 0xa, "0a39d69b9458f3a500722702eca81f8efbc2afdb257e32708125116bdbba110bddfaebf9cbebf416ba4d131551008b5bcc1faa3f728fb84f33e769ab47cb560822ce1d22bae42211e9007a60f120290cdbc9e14cdf2b"}, 0x8f) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)="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", 0x2, 0x0) 13:46:41 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000080)=""/201, 0xc9) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:41 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:46:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:41 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x1) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffffffd) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2100, 0x0) write$P9_RSTAT(r1, &(0x7f0000000240)={0x12c, 0x7d, 0x1, {0x0, 0x125, 0x80000000, 0xf50b, {0x8, 0x4, 0x5}, 0x840000, 0x63db7652, 0x20, 0x81, 0x0, "", 0x1, 'c', 0xee, "47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c29886669700", 0x3, 'em1'}}, 0x12c) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="2d0000000000000e9f1001000000000005001000000000009500000000000000701eac528b9d6818d24f94dbf4bba6879519dd"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) 13:46:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xfe, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x2000000]}, 0x10) 13:46:42 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001007fff", 0x24) 13:46:42 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x200000]}, 0x48) 13:46:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000000000000500000000000000000000000000000000000000000000"], &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) read$eventfd(r1, &(0x7f0000000200), 0x8) 13:46:42 executing program 2: readv(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x100, 0x4) 13:46:42 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) timer_create(0x0, &(0x7f00000005c0)={0x0, 0x12}, &(0x7f0000000580)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1}, 0x40000100) write$binfmt_elf32(r1, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) r2 = gettid() tkill(r2, 0x1000000000016) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x3}) r3 = memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r4, &(0x7f0000000180)=0x4) 13:46:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_targets\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/93, 0x5d}, {&(0x7f00000000c0)=""/83, 0x53}, {&(0x7f0000000140)=""/26, 0x1a}, {&(0x7f0000000180)=""/61, 0x3d}, {&(0x7f00000001c0)=""/16, 0x10}], 0x5, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000300)) 13:46:42 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:46:42 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100000f", 0x24) 13:46:42 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x80, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)={0x190, r1, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x48}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xdc}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x55}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x101}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffffd6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x25}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x57}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000000}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4b}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9fe}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x20008800}, 0x44) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) accept$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000240)=0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3fd}]}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 13:46:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:42 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:46:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x5000000]}, 0x10) 13:46:43 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:43 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 13:46:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x8100, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x88020400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="24052bbd7000fcdbdf250c0000001400020008000600000100000800060004000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x8000) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:43 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000200)={{}, 'syz0\x00', 0x17}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 13:46:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/159) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:43 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) [ 2058.126679] input: syz0 as /devices/virtual/input/input36 13:46:43 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100000f", 0x24) [ 2058.169374] input: syz0 as /devices/virtual/input/input37 13:46:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7, 0x23}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e24, 0x80000001, @loopback, 0x7}}, 0x1, 0xe1, 0x8d74, 0x3ff}, 0x98) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000008c0)={0x6, 0x0, 0x4, 0x401}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x6, 0x0, 0x0, 0x33c4, 0x3, 0x3e, 0x7, 0x92, 0x40, 0x341, 0x80, 0x80000001, 0x38, 0x2, 0x3, 0x0, 0xdc}, [{0x70000003, 0x3, 0x5, 0x7b8f53fc, 0x3, 0x0, 0x1ff, 0x5}, {0x70000005, 0x2, 0x4, 0x9125, 0xab, 0x812, 0x4}], "43b184ddba479a93f04959cf457796dc397c68c6c3eb7eac5ba27695b0449e51d2c47ea4ae0b0c5993f575172ba21112c6d1b6d255d0c119f8da88503c941bb0c9ee285ce5bcc968b5eb7bc5355b1f2afe", [[], [], [], [], [], [], []]}, 0x801) link(0x0, 0x0) 13:46:43 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:43 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 13:46:44 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:46:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=@ipv4_newroute={0x1c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}}, 0x0) 13:46:44 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000ff", 0x24) 13:46:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xff0f0000]}, 0x10) 13:46:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) fallocate(r1, 0x2, 0x7, 0x40) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x8, &(0x7f0000000140)=""/137) 13:46:44 executing program 2: socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)={0xffffffffffffffff}) fstatfs(r0, &(0x7f0000000080)=""/147) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0xfffffe3d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd401000100ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0x80045301, &(0x7f0000000080)={0x0, 0x80, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue1\x00'}) 13:46:44 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000ff", 0x24) 13:46:44 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:46:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000080)=""/4096, 0x1000) setrlimit(0x9, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:44 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:46:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x10040, 0x0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) memfd_create(&(0x7f0000000080)=']\x00', 0x1) 13:46:44 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x1) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:44 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:46:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x6]}, 0x10) 13:46:45 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:46:45 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000004", 0x24) 13:46:45 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socket$alg(0x26, 0x5, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)="68bd0000d7ebd3") getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f0000000240)) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video2\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ed5e683e4aff75573525928ec56ee3b5b639cb05d129112eac4216ea3ef2c86e003b8f1048ad68d3b3c6cc15ebb90ded100f2f4adfcd18bb2826e6ecbeb68e7ca2222e58ec1707640af76bdd6870c93188b083e037fe99a1117fcd", 0x5b, 0x0, 0x0, 0x0) 13:46:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x108) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f0000000340)=""/63) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18) 13:46:45 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000100)=""/1, &(0x7f0000000140)=0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:45 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:45 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:46:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/244, 0xf4}, {&(0x7f0000000780)=""/236, 0xec}, {&(0x7f0000000240)=""/70, 0x46}, {&(0x7f00000002c0)=""/147, 0x93}, {&(0x7f0000000380)=""/79, 0x4f}, {&(0x7f0000000400)=""/163, 0xa3}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/90, 0x5a}, {&(0x7f0000000580)=""/65, 0xff5f}, {&(0x7f0000000600)=""/143, 0x8f}], 0xa) 13:46:45 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x121000, 0x0) setrlimit(0x7, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x2, 0x4, 0xa1200400, {}, {0x0, 0xe, 0x3, 0x0, 0x5, 0x8, "6621b8d1"}, 0x76, 0x4, @fd=0xffffffffffffff9c, 0x4}) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r1) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:45 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 13:46:45 executing program 2: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff9c}) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000080)=""/178, 0xb2}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/215, 0xd7}, {&(0x7f0000001240)=""/74, 0x4a}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/2, 0x2}], 0x7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:45 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080), 0x2) setrlimit(0xb, &(0x7f00000000c0)={0x4, 0x4}) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) timerfd_create(0xb, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x1800000000000000]}, 0x10) 13:46:45 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:46:45 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) 13:46:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) pread64(r0, &(0x7f0000001640)=""/4096, 0x1000, 0x0) 13:46:46 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:46:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000000080), 0x2) 13:46:46 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r2, 0xd}, 0x10) link(0x0, 0x0) 13:46:46 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) getresgid(0x0, &(0x7f0000000280), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0) 13:46:46 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:46:46 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x4) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x200) link(0x0, 0x0) 13:46:46 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) 13:46:46 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/l2cap\x00') readv(r1, &(0x7f0000000180)=[{&(0x7f0000000040)=""/96, 0x60}, {&(0x7f00000000c0)=""/135, 0xb}], 0x2) 13:46:46 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x200000000000000]}, 0x10) 13:46:46 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:46:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) ioctl(r1, 0x20000000, &(0x7f0000000080)="d11bc2edce0abaecb2c65f91bc765d17554453258f08e07ac39cc64877361197d95151f052e29e44999f4153701580e09a1b06bb492036833377cb380927de013594a88bdf34c125bc9ee3f64ec69b4917df0f8c11bfd07c7f33db1341fb7f494e1cae822843b3") link(0x0, 0x0) 13:46:46 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000200)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000140)={{}, 0x8000000000012, 0x8}, 0x2fe) 13:46:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e22, 0x6be, @local, 0xfffffffffffffb9f}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)=0x7) 13:46:46 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x6, [0x6, 0x8, 0xf3, 0x4, 0x5, 0x9f]}, &(0x7f0000000100)=0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r1) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:46 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000f0", 0x24) 13:46:46 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:46:47 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000f0", 0x24) 13:46:47 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 13:46:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000080)) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/96, 0x60}, {&(0x7f00000000c0)=""/135, 0x87}], 0x2) 13:46:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x5}) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 2061.873601] input: syz0 as /devices/virtual/input/input38 [ 2061.911055] input: syz0 as /devices/virtual/input/input39 13:46:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xa00000000000000]}, 0x10) 13:46:47 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000003", 0x24) 13:46:47 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:46:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x108, r1, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7f}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x9}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xa6c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x33}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x27}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x282a}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xa4}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x6}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x85}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x1}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0xa}}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x8000}, 0x40010) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000040)={"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"}) connect$rds(r0, &(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) 13:46:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x7b) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) 13:46:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000010c0)={r0, &(0x7f0000000040)="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", &(0x7f0000001040)="0294daeb1c880d41a44d9bd2714ab328326cfe21b8183546887e88fd4d02617778b7021e8d0fab63e2b2c3ac3c52f6a52d8a8e67f45860d603cec3125a8f3b799b", 0x3}, 0x20) setns(r0, 0x0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:47 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:46:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x3, &(0x7f0000000140)={0x2, 0x9}) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setsig(0x4203, r2, 0x8, &(0x7f0000000100)={0x24, 0x8, 0x5, 0x58}) setrlimit(0xf, &(0x7f0000000080)={0x6, 0x6f22}) r3 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) r4 = accept(r1, &(0x7f0000000280)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000000)=0x80) recvfrom(r1, &(0x7f0000000180)=""/222, 0xde, 0x2000, &(0x7f0000000300)=@hci={0x1f, r5, 0x2}, 0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0xa8, &(0x7f0000000380)=[@in6={0xa, 0x4e21, 0x7, @mcast2, 0x4}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x9, @empty, 0x2}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e24, @rand_addr=0x1f}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000004c0)={r6, 0x1}, &(0x7f0000000500)=0x8) 13:46:47 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:47 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000200)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) 13:46:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) [ 2062.816198] input: syz0 as /devices/virtual/input/input40 13:46:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x500000000000000]}, 0x10) 13:46:48 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:46:48 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000010c0)={'nat\x00', 0x0, 0x4, 0x1000, [], 0x1, &(0x7f0000000080)=[{}], &(0x7f00000000c0)=""/4096}, &(0x7f0000001140)=0x78) memfd_create(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000001180)={0x3, 0x1f, 0x5, 0x9, 0x3, 0x4}) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) 13:46:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) io_setup(0x9ca, &(0x7f0000000040)=0x0) io_submit(r1, 0x3, &(0x7f0000000300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f0000000080)="3bc4688cf560317201bb89e8712371d42a4d71e47b38f4058627bc35d6bb0946b7633f81758f5a011d517e727629f3214ac0951123c325d7f42deec0e3ae863a8783dde4ec44e47dacccdeac1396cd5b", 0x50, 0x5, 0x0, 0x3, r0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7, r0, &(0x7f0000000140)="641e7218f58769afc45c480a199d948ba9afcb910d2a0470e21010b0b64c649c2c2e2132ed06ad036259fd896e38153d5a4cd4aaee473a41eba888b04dff2b455272784f7540baab903b6853b7c6be9e3d034b854a7005d7abd17a7e493889019ad72b212956cc194dea588adce6d47fed104af8155f2c86b1f018ff5de55bc985aa3bd58e6d8e6ddfed84c8abaeac7e459f626cf285502f76f57a78", 0x9c, 0x0, 0x0, 0x0, r0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f0000000240)="2a256ad64a3d674a31752bade0a86589776421e4c7feb5d803e050f297e56784f8a35162eb4a6cad66c2e05be0a41bc541a691f57250ead27d981bc9072727188f3b7b1906625e", 0x47, 0x6, 0x0, 0x3, r0}]) 13:46:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) dup(r0) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:48 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:48 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 13:46:48 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000008", 0x24) 13:46:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') dup(r0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000080)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) 13:46:48 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000080)={0x2a80000000000000, 0x5000, 0x4, 0x3, 0xf}) memfd_create(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:49 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:46:49 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x4002]}, 0x10) 13:46:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/ip_tables_targeos\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x102, 0x0) 13:46:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:49 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 13:46:49 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udplite6\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:49 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f00000000c0)) stat(0x0, 0x0) r2 = memfd_create(0x0, 0x0) dup(r1) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000100)=""/128) 13:46:49 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:46:49 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') write$uinput_user_dev(r0, &(0x7f0000000040)={'syz0\x00', {0x2, 0x9, 0x8, 0xffffffffffff06cc}, 0x2d, [0x9, 0x8, 0x100000000, 0x1, 0x1, 0x7f, 0x401, 0xffff, 0x3f, 0x61, 0x0, 0x80, 0x7f, 0x6, 0x7fffffff, 0x2, 0x71, 0x6, 0x6, 0x2, 0x5, 0x5, 0x6, 0x0, 0x19, 0x9, 0xfffffffffffffff7, 0x20000000000000, 0x401, 0x101, 0x2, 0x6, 0x0, 0x7fffffff, 0x9, 0x6501, 0xbe, 0x3ff, 0x5, 0x5, 0x61, 0x3, 0xfff, 0x80000000, 0x4, 0x80000001, 0x101, 0x7, 0x48000000000, 0x1, 0x3, 0x0, 0x7, 0x0, 0x100000000, 0xb80b, 0x8, 0x6, 0x7, 0x7ff, 0x6, 0x6, 0x2, 0x3ff], [0x9, 0xffff, 0x5, 0x4, 0x0, 0x7fff, 0x10001, 0x66, 0x0, 0x5, 0x3, 0x200, 0x80000000, 0x1, 0x401, 0x4, 0x200, 0x80000000, 0xfffffffffffffff9, 0xe7c, 0xe0000, 0x1f, 0x6, 0x3, 0x7, 0x80000000, 0x0, 0xe178, 0xffffffffffffffff, 0x7f, 0x9, 0x0, 0xf7d, 0xd79b, 0x3f2, 0x7fffffff, 0x4, 0x1, 0x5e2e, 0xc44, 0x1, 0x4, 0x9, 0x788, 0x4, 0x28bdfb3000000000, 0x6, 0x2, 0x7ff, 0x2, 0x83, 0x1, 0x8, 0x15, 0x12000000000, 0x80000000, 0xff, 0x8, 0x101, 0x9, 0x9, 0x3, 0xf48, 0x400080], [0x1, 0x4, 0x200, 0x7, 0x3ce, 0x6, 0xfb54, 0x10001, 0x7, 0x2, 0x40, 0x101, 0x7, 0x81, 0xb94, 0x0, 0x4a, 0x22f, 0x0, 0x7fffffff, 0x6, 0x1ff, 0x1, 0x4, 0x1, 0x8c9, 0x6, 0xffff, 0x6, 0x7, 0x1000, 0xffffffffffff4803, 0x1, 0x7e, 0xfff, 0x4acb, 0x5, 0x0, 0x5, 0x2879, 0x10001, 0x5, 0x89ba, 0x4, 0xbda5, 0xf27, 0x0, 0x7, 0x1, 0x7fff, 0x3, 0xf34, 0x40, 0x0, 0x7, 0x3, 0x80000000, 0x8, 0x6, 0x9, 0x4, 0xfffffffffffffbff, 0x4, 0x6846], [0x5, 0x7, 0x9, 0x9a, 0x4, 0x9, 0x3, 0x1, 0x257, 0x4c2, 0x8001, 0x3ff, 0x80000001, 0x7fffffff, 0xfff, 0x9, 0xac, 0x10001, 0x9, 0x1, 0xe96, 0x200, 0x3ff, 0x8, 0x4, 0x9, 0x0, 0x6, 0x1, 0x81, 0x3f, 0x9, 0x8, 0x20, 0x1, 0x8, 0x7, 0x8, 0x80000000, 0x7, 0x0, 0x44f, 0x2, 0x0, 0x467, 0x3bffb7b0, 0x3ff, 0x1000, 0x6da3, 0xfffffffffffff215, 0xa8, 0x4, 0x5, 0x8, 0x4, 0x3, 0x101, 0x4, 0x4, 0x1, 0x5, 0x5, 0xa954]}, 0x45c) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000500)=0x12, 0x4) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000004c0)={0x29, @rand_addr=0x4, 0x4e22, 0x4, 'dh\x00', 0x21, 0x5, 0x2c}, 0x2c) 13:46:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x1a86]}, 0x10) 13:46:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000300)={0x4, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e23, 0x80, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x97}, r3}}, 0x38) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000340)) r4 = syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8102}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xbc, r4, 0x401, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xef28}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x30}}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4000005}, 0x4040080) 13:46:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:50 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:50 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:46:50 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080)={0xa, 0x8, 0xe8e, 0xf8}, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/96, 0x60}, {&(0x7f0000000100)=""/135, 0x87}], 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000000c0)=0x20) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000080)=0x771e) 13:46:50 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:46:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x40, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:50 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:51 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$KVM_NMI(r0, 0xae9a) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:51 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000ff", 0x24) 13:46:51 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 13:46:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x2000]}, 0x10) 13:46:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000140)={0x7, 0x4b, 0x2}, 0x7) memfd_create(0x0, 0x0) r1 = dup(r0) mkdir(&(0x7f0000000080)='./file0\x00', 0xa0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r0}) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:51 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000010", 0x24) 13:46:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='vegas\x00', 0x6) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) link(0x0, 0x0) 13:46:51 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:46:51 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000040)="f98091d4d4b87ce8927237") readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:51 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:46:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)=0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000580)=0x0) write$P9_RSTATu(r0, &(0x7f0000001040)={0x84, 0x7d, 0x2, {{0x0, 0x59, 0x3, 0xffff, {0x20, 0x4, 0x4}, 0x0, 0xff, 0x7f, 0x5, 0x6, 'wlan0.', 0x9, 'bdevnodev', 0x1, '-', 0x16, 'net/ip_tables_targets\x00'}, 0x16, 'net/ip_tables_targets\x00', r3, r4, r2}}, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) r8 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) r10 = getgid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000900)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@ipv4, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000b00)=0x0) r15 = geteuid() getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) fcntl$getownex(r0, 0x10, &(0x7f0000000c00)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c40)={0x0, 0x0}, &(0x7f0000000c80)=0xc) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000d80)=0x0) fstat(r0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000e40)=[0xee00, 0x0, 0xee00]) socket$nl_route(0x10, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000001000)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)="416b21a228eed2930deba95c2cbb9709fded3f18719472285a770a4573894aa4a7fc62841b7bd9031fa0cc99573d35192d69f30317d7", 0x36}, {&(0x7f0000000100)="9f4eddc68a4a1511f50609170294f2dad375b1a650741f88c1b7fdb69a250eafc2e68eba5fec3a3841684530d6863e3f45fdcf99f3574f8ea9cdf891f9cd017b0b12be9a76dd71fc1d83e123b4aed755a18cf6f056ed1e359afcf2365ef8ab1d9bde76adce297cee24ebdf4c024c335cd042831b7a3fd513dccb084091b7", 0x7e}, {&(0x7f0000000180)}, {&(0x7f00000001c0)="c0a260e6d582a1fea38878f85326956ec7976adfe516ee2208854c48bfe9e5de14e6a3d9f746a2396b3a6850b618b9961ef7b2b60d8ce9a08e63e7b3bdb3bf6a2d1c9da4125648e6e203c494b673078efe674926f79c3dd584aad1b3389ce69b237998f4796bad959d16d369957d8720f701d48986ecb207527e0736ea136b5bb62f5bdabaa1f239dd6fa13ceb628c56b8873a54eeaedd24c0eca75b92e880f3a13c945ae10b2e11dde5ccc9b68914a30299d7", 0xb3}, {&(0x7f0000000280)="42a75f75577ced5ec14bbacb548d35179b126f023aca352af53e351fb17591909384591a7f1954c5b18da5df75426e6d50c9a5754a446c8a12761caafc84efdaadf3fd129a04cbf1ef30a5e850e7fcaf41b349e332b52433b9de558ab7f54c086a49fb40dff5e57ca46d79d3aebad861b2c63246ca82b507ec765211b5d9a2a72418054f82eb33ad0ee5335b7205beed922f38d380a8530c5e8539ef207d6b241d14a00b5dff8140e0424ea9006b47eb0ed3febaba8ebe9372fcdd8755d0680337214e9eed2821f37607b2cbd68c056e7ebd7afa08947805c5", 0xd9}], 0x5, &(0x7f0000000e80)=[@cred={0x20, 0x1, 0x2, r1, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0x170, 0x800}, 0x800) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:51 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000002", 0x24) 13:46:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xff0f]}, 0x10) 13:46:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) accept4$packet(r0, 0x0, &(0x7f0000000080), 0x80000) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:52 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 13:46:52 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:52 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) ioperm(0x0, 0x0, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:52 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:52 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:46:52 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:52 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:52 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) [ 2067.408992] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:46:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0xffff, 0x7fff}, &(0x7f00000001c0)=0x8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) r7 = getgid() lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000640)=[0xee00]) r10 = getegid() r11 = getgid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x4}, [{0x2, 0x4, r3}, {0x2, 0x4, r4}, {0x2, 0x7, r5}, {0x2, 0x0, r6}], {0x4, 0x2}, [{0x8, 0x2, r7}, {0x8, 0x0, r8}, {0x8, 0x3, r9}, {0x8, 0x1, r10}, {0x8, 0x4, r11}], {0x10, 0x1}, {0x20, 0x1}}, 0x6c, 0x2) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x1a080, 0x0) [ 2067.613756] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:46:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x240]}, 0x10) 13:46:53 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:53 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100007f", 0x24) 13:46:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/96, 0xfffffffffffffce9}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:53 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:46:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = memfd_create(0x0, 0x0) r2 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000080)={0x2, 0xff}) link(0x0, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000000c0)={0x800, 0xfffffffffffff4a3, 0x2}) 13:46:53 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:53 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f00000001c0)={0x3, 0x0, 0xe7, [], &(0x7f0000000180)}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x8000) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x100) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:53 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x4}) link(0x0, 0x0) 13:46:53 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:46:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xc9c0d59f98010000]}, 0x10) 13:46:54 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 13:46:54 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:46:54 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:54 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:54 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:54 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:54 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:46:54 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:54 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) pkey_alloc(0x0, 0x3) 13:46:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x91ffffff]}, 0x10) 13:46:55 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000094", 0x24) 13:46:55 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:46:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f00000002c0)={0x9, 0x0, &(0x7f0000000100)="cbcbf7bdafec7b1babccfcce520c479a9eb84f5090122c17e687d5129b15d0cad5e5e4eec513e1e9f235b8e249535884df0bb2290aebdc2ab6d7bc69ab3fcc6229efeadd2f78531f2ec68cea63c1be91fe0bca232771be82d873a0bfeabc8ad3358ac0bb2b6041ee8a306b10ecf1cab08e1d14270819dafb34721d0ab06cd6e1a5a345e4ef2447d61f94ae88d7875474375dbe8e3ce16486c4dcab36966c63b6c3815ba0a28c9364b2423762a47a824a5c54f3a4dd1b45e9ccb1a62dd83bb7cea0b2457df7704ed8b97b2a74a2d99e50196d9b5a2cbd4a9f5cced4237893d4e1fdc8a95f27857d9184db6da0eaa5", &(0x7f0000000200)="f18e6bb8e0c107eb72af1d9aff8c2e21957ec9c5b386fb1ec6450fb04b8de1e539459ede8f4a15a5007f040040b9fc1901a0277414ceb382dd08a05bac1d9e51b86077d2a0a6dcad85994c547ae02214052f72974f598f5feea3751305f43408ed7f27e73218efdc898c63ff1396713191a4cbec4586f1d48fe574660976b43e3d", 0xee, 0x81}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x10001, 0xb, 0x4, 0x40, {0x0, 0x2710}, {0x3, 0x2, 0x8, 0x7f, 0x9, 0x5, "98b05452"}, 0x8000, 0x5, @userptr=0x9, 0x4}) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(r1) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:55 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:55 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000200)=0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000100)='security.SMACK64IPIN\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x80008, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xfff}}], [{@subj_role={'subj_role', 0x3d, "617474722f020000000000000001c6f4c36719a69a03e4403b00adbf942da65868243da94e7f15b7b20da1cbd12dc97bef82f1ab154dcb36e5052849da4024bff7ef2d8cdf4011ce016f63e76ea4605f4dfbc1665706f00752f3db30b3084f2b894df197fd8fc59bc4e0c084d12a2be046bb1dc08b2de4351eb99397711f85e862887c9e31d1d91a0700c55ec03a06ffd005d1c8a6745a93c4e543b7405cb06694ea5a87fdc92b46e261"}}, {@uid_eq={'uid', 0x3d, r3}}]}}) r4 = gettid() r5 = syz_open_procfs(r4, &(0x7f00000002c0)="617474722f020000000000000001c6f4c36719a69a03e4403b00adbf942da65868243da94e7f15b7b20da1cbd12dc97bef82f1ab154dcb36e5052849da4024bff7ef2d8cdf4011ce016f63e76ea4605f4dfbc1665706f00752f3db30b3084f2b894df197fd8fc59bc4e0c084d12a2be046bb1dc08b2de4351eb99397711f85e862887c9e31d1d91a0700c55ec03a06ffd005d1c8a6745a93c4e543b7405cb06694ea5a87fdc92b46e261") readv(r5, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x4}], 0x1) fsetxattr$security_smack_entry(r5, &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f00000000c0)='net/ip_tables_targets\x00', 0x16, 0x2) 13:46:55 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:55 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x200) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'veth0_to_bond\x00', r2}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x3) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000380)={0x1, 0x1, 0x3, 'queue0\x00', 0x9}) accept4$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000280)=0x8740c249ca565cec, 0x8000000080880) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:55 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 13:46:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000100)={0x1, 0x1a, &(0x7f00000000c0)="1ea75730bf08036166f6f3a0b5e8b9b16847c78d23b0f70dc422"}) setrlimit(0x5, &(0x7f0000000000)={0xfffffffffffffffe, 0x20000000}) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x7) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) dup(r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x80000000, 0x9}) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:55 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:55 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:46:56 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:56 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x80000, 0x45) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x2, @remote}, @in6={0xa, 0x4e23, 0x101, @empty, 0x4}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e20, 0x1, @mcast2, 0x18000000000000}, @in={0x2, 0xd77, @multicast1}], 0x78) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/softnet_stat\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x861a]}, 0x10) 13:46:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x4, &(0x7f0000000080)) pipe2$9p(&(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bind$bt_rfcomm(r0, &(0x7f0000001180)={0x1f, {0x8001, 0x5, 0x6, 0xfffffffffffffffb, 0x5, 0xffffffffffffff7b}, 0xef}, 0xa) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f00000011c0)) preadv(r1, &(0x7f0000001700)=[{&(0x7f0000001240)=""/140, 0x8c}, {&(0x7f0000001300)=""/179, 0xb3}, {&(0x7f00000013c0)=""/66, 0x42}, {&(0x7f0000001440)=""/103, 0x67}, {&(0x7f00000014c0)=""/35, 0x23}, {&(0x7f0000001500)=""/22, 0x16}, {&(0x7f0000001540)=""/17, 0x11}, {&(0x7f0000001580)=""/21, 0x15}, {&(0x7f00000015c0)=""/235, 0xeb}, {&(0x7f00000016c0)=""/1, 0x1}], 0xa, 0x0) stat(0x0, 0x0) pwritev(r1, &(0x7f0000001b80)=[{&(0x7f00000017c0)="933c180a5c017c780d56d8459aee437cef8b1447e8637e08b6778dd8f9449e88be5d77f3c43add581f2a43c735caa85648acccdf4a814bfc2da7d52503fa9afeaf364cdca192f8b44802ad70c223fe0268816f164bb7d23213", 0x59}, {&(0x7f0000001840)="e51a239b2a4b07cd9adc4cb049af558e83b6d75d4b22fe57dde938a06e0c1caa8f14bb9d16ae15859a853f012b0ed25e6f0bc543ef0736c64367c582581a26913ce223b95c77437763b7db41c831a5ed73aefe8f057a79ee36feebf0c67eabd0237b74d161bc8642bb62c7bbe6e38c2036d9f982962702f67a6359092abf64d63daeb34c60e58adeb831d05f2b088481ebde140f2fbcf7689e5cbccac989e286872a0e1124802cf1826d3eb3e140575e0ac5d5c1558fcded4110c5b35c9bb7d5a0bee52ead5a1b04e939a4f223d51fe509b84ca1ea24536a937923970988710b55587b9f640cced2c6e05bb3d0f7ed6a50a4", 0xf2}, {&(0x7f0000001940)="cd209f3b7ea0c25e6c071dea796004", 0xf}, {&(0x7f0000001980)="8e85a322bcdf068cc5f2904937fd780ec2a6f2bbbcf7f7e37f0f65ebb576a88f77027e6ac1d74257b5cdbb224b0d46c90e32fa54618d86cbc6ead925ec24a6654a2462769e134313c08ef0da56d14d89945f14edf3252423b8f9e4b4999c87c87db17062815832d0770f324bfa23f3d986b38ab7f7a46b1188aa753b5a7bbcb508223734a485aa247d3f323847057b836f61d42d0ffcd82e55552de319f7fa777c7ab1", 0xa3}, {&(0x7f0000001a40)="1b5ab8d649e737c9617e267a1e8082618c5ed6116d31a2303c580f68a69cc3a110c8ca187ada4d67b67e271d002cbf048e0d34d794", 0x35}, {&(0x7f0000001a80)="ece6183257a79f259cee817b42a3b1140355cc474e60dbdf7043258ee7fd3f5127d77ca0b8f6ae1837b2a10c2df64f9030da8bf204abd8336ddf850a91180795746bd3fd844adbe63bbf194ab7bc33614287d9f84d7b9769ac675bb068b9d1825a236aa02aaf9d643af78deae9db8e6d93bdb002f795896bd936f9dbb18b05a1d81a2470acc436a27bb2a66ed042ffbc9adfa666e911d08d74dc5f8ccad062a83879740bf28ce30577ca81936fb92a62b183f96fe8b98dbfab3b615f63eb95bf49f2e6263c16f541a1c6a10454bde89371e8ad7a65a1529de1ec7d334a1b49f34fa4398842d96766edad94af0befc7c9", 0xf0}], 0x6, 0x0) r2 = memfd_create(0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000010c0)={@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1}, 0x4, 0x3, 0x3, 0x1}}, {&(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000000000), 0x38}, 0xa0) dup(r0) link(0x0, 0x0) 13:46:56 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 13:46:56 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) recvfrom(r0, &(0x7f0000000040)=""/232, 0xe8, 0xfc, &(0x7f0000000140)=@ethernet={0x0, @remote}, 0x4d) 13:46:56 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 13:46:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:56 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)={0x10000, 0xfff}) 13:46:56 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914"], 0x34) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:56 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:46:56 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:56 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914"], 0x34) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x300]}, 0x10) 13:46:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @empty}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) sendmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x7, 0x0, 0x2f, {}, {0x77359400}, {0x2, 0x80000000, 0x80000000, 0x5}, 0x1, @can={{0x3, 0xfff, 0x5, 0x3}, 0x4, 0x0, 0x0, 0x0, "7db09bc1162c68bc"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101040, 0x0) 13:46:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ts\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0xfffffffffffffda2}], 0x2) 13:46:56 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:46:56 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100003c", 0x24) 13:46:56 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:56 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:57 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) 13:46:57 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:46:57 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:57 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b38000200000000000000030000000000000000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x1989fd5c0c9]}, 0x10) 13:46:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0xffff, 0x2100) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000040)={{0x3, @name="1ac73076cd43152297ac0f7aacecf584fe1f58a17dd3c4475093ef25330f3935"}, "8ae69be690f1291c121954afa9ba6474f841cce0419057b3821057150d4a3e66", 0x1}) r1 = msgget(0x3, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) r3 = getgid() r4 = getuid() fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = fcntl$getown(r0, 0x9) r7 = getpgid(0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000380)={{0x5cc, r2, r3, r4, r5, 0x128, 0x2}, 0x87f5, 0x5, 0x3, 0x6, 0x6, 0xff, r6, r7}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$setown(r0, 0x8, r8) 13:46:57 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 13:46:57 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b38000200000000000000030000000000000000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:57 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:57 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b38000200000000000000030000000000000000000000000000000000000000000000000000"], 0x5b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:57 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:57 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800"], 0x62) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:58 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:46:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x4c) 13:46:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x284083}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="cd45080000000000000029b0666ef67da9b9a22c8efe06cc47a98398e7fa2f250ada12d58098b89e7acfe8aeec57bd00000000", @ANYRES16=r1, @ANYBLOB="040025bd7000fcdbdf251000000008000500ffff0000"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) r2 = add_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="7ee26922ef13001257f3c040ef52d9c15616776b2396fd5c9c1b2ee0bbd37da5a0fd9ccff177209a17", 0x29, 0xfffffffffffffffe) keyctl$unlink(0x9, r2, r3) link(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x44daec560c4eb925) 13:46:58 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:46:58 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800"], 0x62) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:58 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x218]}, 0x10) 13:46:58 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/225, &(0x7f0000000180)=0xe1) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000001c0)={0x77359400}, 0x10) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x200) link(0x0, 0x0) 13:46:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000fffffffb0000000005000600000000000a0000000000000000000000000000000000ffff000000000000000000000000050009008000000b0a0000000000000000000000ee5d2c00000000000000000000000000000000000000000200010000000000000000060000000005000500000000000a00000000000000ff0200000000000000000000000000010000370944"], 0x98}}, 0x0) stat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000280)=0xe8) getgroups(0x5, &(0x7f00000002c0)=[0xee00, 0x0, 0xee01, 0xee01, 0x0]) fchown(r1, r3, r4) r5 = memfd_create(0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r7 = dup(r0) syz_genetlink_get_family_id$ipvs(0x0) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r7, 0x84, 0x17, &(0x7f0000000380)={r9, 0x0, 0x60, "f5063228252f17c15a990ce994dc5e8a60be63b0409e6a8e11335154c122a1e68f19aed591c59206f94e765b1c43e1291cf3fb989b635d97a357b61e9ba83f50f6fb5011bc1cd3d61a9374b174881a19824226af30eb4ef4e8c7d21aa8521568"}, 0x68) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) link(0x0, 0x0) write$binfmt_script(r5, &(0x7f0000000400)={'#! ', './file0', [{0x20, '/dev/ppp\x00'}], 0xa, "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"}, 0x1015) 13:46:58 executing program 2: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4, 0x8000) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000012c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005ac0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005bc0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000005cc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005d00)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000005e00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000007280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000072c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000007300)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000007400)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007440)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000007540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000007640)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000007740)={@multicast1, @multicast2, 0x0}, &(0x7f0000007780)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000077c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007800)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000007b40)={'ip_vti0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000007b80)={@loopback, @local, 0x0}, &(0x7f0000007bc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000080c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2a000001}, 0xc, &(0x7f0000008080)={&(0x7f0000007c00)={0x480, r1, 0x400, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x4}}, {{0x8, 0x1, r3}, {0xbc, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}]}}, {{0x8, 0x1, r8}, {0xb0, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r9}, {0x15c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfc7}}}]}}, {{0x8, 0x1, r12}, {0xac, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7264}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0x80, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}]}, 0x480}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040800) r15 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') ioctl$VIDIOC_SUBDEV_S_EDID(r15, 0xc0285629, &(0x7f0000000080)={0x400, 0x6, 0x10001, [], &(0x7f0000000000)=0x80000000}) readv(r15, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:58 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:46:58 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:58 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000"], 0x65) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:59 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:46:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)="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", 0x2, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000080)=""/171) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) 13:46:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000100)=0x89) r2 = dup(r0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000600)) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000200)=0x8000000000005) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$ipvs(0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000002c0)) link(0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000140)={0xef, @broadcast}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x80, 0x4) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0xfd31) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r3, 0x7fff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x1000, @loopback, 0x400}, @in={0x2, 0x4e23, @rand_addr=0x9}}}, 0x118) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000480)) listxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/14, 0xe) 13:46:59 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:46:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x91ffffff00000000]}, 0x10) 13:46:59 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f8000000000000"], 0x67) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:59 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f080002800100009e", 0x24) 13:46:59 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:46:59 executing program 2: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:46:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) 13:46:59 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f8000000000000"], 0x67) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:59 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:46:59 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f8000000000000"], 0x67) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:46:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(r0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:46:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000080)="66ba420066ed27b8010000000f01c1c4c2791eec0f21fd2e360fc75e6c0f01cf2ef2e305c4c12d6dfa662e66660f56cb", 0x30}], 0x1, 0x0, &(0x7f0000000100), 0x0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f0000000040)="d771cf8f0c8edebfa4dc0d9ffbb3035e9412a8ccf552c19a0d6dfc4462dd1a9cce21d4a9f1e79add3b2afa908f922edde9fe5e1689c3ee76560899a917a0b1a88a7dae411d7f2bb8470d2b7b08823bf5a1ff7cc550ecf0ecf4625b543a88de36a0534d31c475f4a341dd1fb80c41610c15238cf023437e3a82f15a876d751c72916f00fb98e121a29c9dc84492526a8caac218", 0x93) 13:46:59 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x100000000000000]}, 0x10) 13:47:00 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x1, 0xb94e, 0x40, 0x9}) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101000, 0x0) 13:47:00 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:47:00 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:00 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') 13:47:00 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f08000280010000ff", 0x24) 13:47:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="63001073917b446e000000004000002f06bf6869aaa6715185") readv(r0, &(0x7f0000000180), 0xdd590de3c3d32ad7) 13:47:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup(r0) recvmsg(r1, &(0x7f0000000200)={&(0x7f0000000080)=@ipx, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/31, 0x1f}], 0x1, &(0x7f0000000180)=""/123, 0x7b, 0xffffffff}, 0x40000002) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:47:00 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:47:00 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:00 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=0xffffffffffffffff, 0x4) open_by_handle_at(r0, &(0x7f0000000140)={0xce, 0x100, "d8f0f61a8a972b3ac971c5c75c284f6b49afe12036e22fc26a0b68d7dcbeebc7bc2b364173de00fc8566c508365b628f4b79d560d56fefd4cc63d46683137fc196b95147552f1a6df1d05cc4cfb39b856a34cd3df1394c5700b5412fcd4775d46bf71cad99eed12e1a9d6db9e50f9933d1a95735e1a82f0a1d30d92b51094a420b0c5e1b9e79ed683ddbf882736b3bee04c9bd864d03351c11e0a10a6f7ec087c522b230344ee283bc2d0bbdc4d2e16855e6bfc33c480a382cf8e8da9e59e884e5f4b53b4d07"}, 0x200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x1802000000000000]}, 0x10) 13:47:01 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0xc0) 13:47:01 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:47:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:47:01 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:01 executing program 2: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7fffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:01 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xd1, "b33460222029752fff1adae72cb912256ac62b03ab9800d1563be8f348564fddd33a40c4d513d75d299e58f935b86f991f8e7ace1d590fb7f0d1389db9450a65f3044cd9d32b795d297289d5c9306369e707d8a5eb9f127a43fb6be39295afd6c02d2eed567c7b911bbd346a36c74c57367724728267ce312edab3da11f062637742b4452daa21fd6ecf44cd346694cc90baec7ed83dd69063940dd78ccc0e50d8b890dfde2a18129ee7c78716e52db2b870bb4d5b815fc5af75f670ec3ec95130fa8ccfb961b72391925cbbf8556f3c45"}, &(0x7f0000000180)=0xd9) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1, 0x3f, 0x9}, 0xc) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) 13:47:01 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0xf) 13:47:01 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:47:01 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:01 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x101000, 0x0) r1 = fanotify_init(0x1, 0x8000) poll(&(0x7f00000000c0)=[{r0, 0x80a1}, {r1, 0x500}], 0x2000000000000295, 0xf0a) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r2) syz_genetlink_get_family_id$ipvs(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x80, 0x0) link(0x0, 0x0) 13:47:02 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:47:02 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x10) 13:47:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="6e65742f69705f7461626c6573b50000000065743300") readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0xe81b, 0x1, 0x1ce}) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000080)={{0x6, @addr=0x5c7}, "7cbc5a91d3d245b15b4246b5216dbcb0e60e7f5b28568c665d6cfd9248bae001"}) 13:47:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x3000000]}, 0x10) 13:47:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x1) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:47:02 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x50, 0x85, 0xffff, "0785f0956d08c0353673aad94870058d9169fe54e65138d2671681a80210a410ee90db8686adeafbab28dd4f3502a643ff19770c590a0089250f90952059e65914bb337e3293c6a18a9fd6eac83b45d5"}) 13:47:02 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:47:02 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x20000164) 13:47:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:47:02 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:02 executing program 2: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip_tables_targets\x00') clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x0, 0x10000032, 0xffffffffffffffff, 0x0) ptrace(0x10, r2) ptrace$poke(0x4, r2, &(0x7f0000000140), 0x0) socket$pppoe(0x18, 0x1, 0x0) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:02 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 13:47:02 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x33fe0) 13:47:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x17) r1 = memfd_create(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x4, {0xa, 0x4e22, 0x6d17, @loopback, 0x80000001}, r2}}, 0x38) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x102) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) link(0x0, 0x0) 13:47:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x2]}, 0x10) 13:47:03 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1"], 0x48) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:03 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 13:47:03 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0xfffffffffffffdef) 13:47:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) sched_setparam(r1, &(0x7f0000000100)=0xff) r2 = memfd_create(0x0, 0x0) setrlimit(0x2, &(0x7f0000000080)={0xffffffff, 0x80000000}) dup(r2) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:47:03 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:47:03 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5df"], 0x6c) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x16}, 0xf9}}}, &(0x7f0000000140)=0x84) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000280)={0x3, 0x400, 0x100b, 0x0, 0x8, {0x6, 0xffff}}) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r2 = memfd_create(0x0, 0x0) dup(r0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x1, 0x7, 0x8000, 0xfb60, 0x800, 0x10000, 0x8, 0x7, r1}, 0x20) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000300)={'veth0\x00', {0x2, 0x4e23, @multicast1}}) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) 13:47:03 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200000, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rt6_stats\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='attr/fscreate\x00') fadvise64(r1, 0x0, 0x7, 0x0) readv(r3, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:03 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0xec0) 13:47:03 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:47:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) memfd_create(0x0, 0x0) dup(r0) syz_genetlink_get_family_id$ipvs(0x0) stat(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe) link(0x0, 0x0) 13:47:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x2000000000000000]}, 0x10) 13:47:04 executing program 2: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0xffffffffffffff54}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r2 = semget(0x3, 0x7, 0x80) semctl$SETVAL(r2, 0x1, 0x10, &(0x7f0000000040)=0x8) semctl$IPC_RMID(r2, 0x0, 0x0) 13:47:04 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0xfffffdef) 13:47:04 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:47:04 executing program 1: socketpair(0xa, 0x0, 0x4, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000300)={{0x9, 0x4, 0x40, 0x1002, 0x7fff, 0xffffffffffffe6f6}, 0xf2, 0x1, 0x8, 0x2, 0x1f, "027544ee6fde3ec0ce9f41ea82b2bea3bee327cbab9adc217698e0e0888fad4986c7b741ea2d75f4de3788b57de71e157410440e8c800090c3990687985e01d1ce3fe75272f9198d3fb4df3398ea40bd0cd33ab7b5f2f2d49be70b97e3d5353ca472e0221e9adef8d59797d10a3803ad32ab9498ebdb336287a55e361c4ad317"}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) setrlimit(0x7, &(0x7f0000000000)) stat(0x0, 0x0) r3 = memfd_create(0x0, 0x6) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={r4, 0x0, 0x80000000}) dup(r2) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x100) syz_genetlink_get_family_id$ipvs(0x0) link(0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000100)={0x12, 0xd4, &(0x7f00000003c0)="4b116289b7ea5a383673ac16ea7a7fe2289461af462813ffad88746b19b5228f81be18013b7e6a25aca7c35a5d219610c8ff5c640e366b7f3a1a94e4264db261427b771db3484ebbd1d12738d0cb4696ba0be3ff6489fced62cc910eba347947beebc9525ff9caa59a1d400d98347de9a98e329a82e34c9e9e526cd4eecdabd8e785ee60d9933fc412fd52f0b48c5fab6206eaa160e9c1dc5dc144e2e1a422c32d07bea34a501eb0b112ed91299be24da45b4379c0234547309b9cc07efab33840fd3f52a5714ef9001dab78b030ee35df8b79a0"}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:crypt_device_t:s0\x00', 0x24, 0x2) 13:47:04 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5df"], 0x6c) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:04 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0xfdef) 13:47:04 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:47:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x8, 0xffffffffffffffff, 0xfffffffffffffff8, 0x80000000}) 13:47:04 executing program 1: 13:47:04 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0xa8200, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) r1 = socket(0x4, 0x4, 0x0) r2 = dup2(r1, r1) r3 = dup(r2) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) fcntl$getown(r3, 0x9) [ 2079.424421] IPVS: ftp: loaded support on port[0] = 21 13:47:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') sendmmsg$alg(r0, &(0x7f0000001380)=[{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000040)="9ac35a0beaef95f2d351137d61af45a2afe3ac0dbc30ca", 0x17}, {&(0x7f0000000080)="660d10b275a48d7ef2faca89c93dc6fc213d", 0x12}, {&(0x7f00000000c0)="1f8923bbb87ca6ebedaea533542091fbd871a909ce5d2201c9a2b28b8c61e2c20141d1ccca871fc26bf122f5c7fd9ccd4c1ba36ed4cc42e6783f1750901a947d5ab80e51c237d56294699a03d4c08c788de13dc8c4358d1d51f322f453873029c2565784a7323b5c68", 0x69}, {&(0x7f0000000140)="4020581c583fda7b4b95f3dc86130ff790ddd6fdf5459631fdbc51fa7ff503a0e6550760c8489df60d487e61f606915d26a4df10", 0x34}, {&(0x7f0000000180)="6ac05e1f9ad722e9c6d44797dde6ff17ed0d78dfe3d2dbd9b641c5d8b2b67cd85a3bc4d35470c2bb0743dadb0a88a8f9a8ccbd89d830c5de5039869f7d0b", 0x3e}, {&(0x7f00000001c0)="1a57d8efa9347468c4e4cf52d909647620c3a3e8ba1d500a256168027c2a7d1460028abeffb070d569adbe88fa888778a109b5795303304d3565c5a1e9694c2f8f7c471dadf18002c08e0825c21bb8dd26d487a9e77b82b81521e4f5e2074e21a16792e47017150219cb5f6ac5047f289536e2cfc299139a9661c8b9536249051f354343510442ad45", 0x89}, {&(0x7f0000000280)="230354d05490e59c9f7f7a34be6f85ac39b02e790b799d76a77a21c9c65ec2979b5bc904b52f552dc6c8680c0acd508ce199b66346e54f61d4917d20c492153db91eaf0b470fcd70e4233f134a94ceae3a834dd9ac018da166065c969d82bdf0c1230a37", 0x64}, {&(0x7f0000000300)="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", 0x1000}], 0x8, &(0x7f00000016c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7fff}, @op={0x18}, @iv={0xa8, 0x117, 0x2, 0x8d, "bb4e6191f947445b66e9a3eb57947538f5d36a0f6f1fd118497bc3a59a8179219806f1a5a0ef4ca7ba96b19caa48dad7257c77ffc0212f4eaf981348995a263e78de791f8c45ce87a5c9411226c5907868a7772e24c51c28f971ba0c0bc2502d4221d5c35df28e3a40ef8f863cdd4ada1df53d27ff53104cca82bf2ab0b0e3ddfcab24c82312a4a3a737b85a46"}], 0x120, 0xc004}], 0x1, 0x400c000) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) fcntl$setstatus(r0, 0x4, 0x4400) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001800)={{{@in6=@dev, @in=@empty}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000013c0)=0xe8) [ 2079.491105] device bridge_slave_1 left promiscuous mode [ 2079.498675] bridge0: port 2(bridge_slave_1) entered disabled state [ 2079.577539] device bridge_slave_0 left promiscuous mode [ 2079.585606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2079.669263] team0 (unregistering): Port device team_slave_1 removed [ 2079.679749] team0 (unregistering): Port device team_slave_0 removed [ 2079.691170] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2079.721687] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2079.797716] bond0 (unregistering): Released all slaves 13:47:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x5000000000000]}, 0x10) 13:47:05 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 13:47:05 executing program 1: 13:47:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x40000000}) 13:47:05 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x3ff) r1 = socket(0x1000000000000010, 0x80802, 0x0) r2 = dup2(r1, r1) r3 = dup(r2) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) [ 2080.754434] bridge0: port 1(bridge_slave_0) entered blocking state [ 2080.761040] bridge0: port 1(bridge_slave_0) entered disabled state [ 2080.768769] device bridge_slave_0 entered promiscuous mode [ 2080.821124] bridge0: port 2(bridge_slave_1) entered blocking state [ 2080.827747] bridge0: port 2(bridge_slave_1) entered disabled state [ 2080.835427] device bridge_slave_1 entered promiscuous mode [ 2080.889329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2080.952305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2081.108435] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2081.157809] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2081.378111] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2081.385530] team0: Port device team_slave_0 added [ 2081.432042] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2081.439430] team0: Port device team_slave_1 added [ 2081.483021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2081.533492] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2081.579576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2081.586835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2081.603075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2081.628032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2081.635031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2081.644386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2082.003101] bridge0: port 2(bridge_slave_1) entered blocking state [ 2082.009486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2082.016239] bridge0: port 1(bridge_slave_0) entered blocking state [ 2082.022612] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2082.030552] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2082.983179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2083.046010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2083.079824] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2083.173210] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2083.179439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2083.186718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2083.278753] 8021q: adding VLAN 0 to HW filter on device team0 13:47:09 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592ad"], 0x7e) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:09 executing program 2: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='environ\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:47:09 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket(0x0, 0x0, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendto$inet6(r4, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1f, 0x9, 0xa95, 0x7, 0x93a4}, 0x14) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @dev, @local}, &(0x7f0000000280)=0xc) 13:47:09 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:47:09 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r2) r3 = dup(r1) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x700]}, 0x10) 13:47:09 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:47:09 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186"], 0x87) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x420b15a0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x7f, 0x8, 0x200, 0x80000000, 0x5a0d, 0x3, 0x8, 0x94f6, r1}, 0x20) 13:47:09 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:09 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:47:09 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) socket(0x8, 0x80000, 0x9cab) r1 = dup2(r0, r0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0xf}, @multicast1, r2}, 0xc) r3 = dup(r1) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) socket(0x11, 0x801, 0x2) 13:47:09 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66"], 0x8c) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:09 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66"], 0x8c) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x100, 0x100}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) 13:47:09 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:47:09 executing program 3: r0 = socket(0x1000000000000010, 0x80803, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x600000, 0xdde5, 0x5, 0x6, 0x2, 0x3f, 0x43, 0x18d, 0x40, 0x16f, 0x2, 0x8000, 0x38, 0x1, 0xeec, 0x9, 0x5}, [{0x6474e551, 0x1000, 0x2, 0x10000, 0x6, 0x6, 0x7ff, 0x6}, {0x6, 0xf966, 0x0, 0x80000001, 0x6, 0x1, 0x9, 0xc6}], "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", [[]]}, 0x11b0) 13:47:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x7ffffffff000]}, 0x10) 13:47:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$VT_ACTIVATE(r0, 0x5606, 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000200)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10001, 0x0) 13:47:09 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3"], 0x8e) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:09 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r0, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r3, 0x4, 0x3}, &(0x7f0000000100)=0xc) 13:47:09 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 13:47:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000200)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 13:47:10 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f2"], 0x8f) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:10 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080)=0x5, 0x4) [ 2084.777605] input: syz0 as /devices/virtual/input/input42 [ 2084.803571] input: syz0 as /devices/virtual/input/input43 13:47:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x1000, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:10 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:47:10 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:10 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = socket(0x1000000000000010, 0x80802, 0x817) r2 = dup2(r1, r1) r3 = dup(r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000040)=',\x00', 0xffffffffffffffff}, 0x30) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000006c0), 0x1) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000880)={0x0, 0x4000000000, 0x3037}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x98b8302}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x3e8, 0xd, 0x8, 0x129, 0x70bd27, 0x25dfdbfb, {0x1, 0x0, 0x2}, [@nested={0x390, 0x48, [@typed={0x54, 0x89, @binary="e2af37475fa6bb7a615d9d01c624d221093e9bddf25533becd3fe9b16ae76a819fb1944f2d04743dbc8e4f10f2fe5a5155626da317f0e9fbc0778964080b4b88f23a8873a08094f00d7be09ca9"}, @generic="720b6a062a75fc226412544262f4663ef2e6ccbff9e0bd1c9043aa3fb405a4011068a7318d59a12790a34d92a5f9073263da63957e41be5e2c7cb129378f5c0773262e0c10dfcc055fe1cf57391ba12a8239f236334130a2ed91f3e3f47ec70af1c6fa46d1e54c5afa1966674bbffe26232299b60dca878e364f80cac6dc806a4497b97ece358eb32b78d77a876abfd1c21b18a1cc0d79c941a1248bc7c52e68a55097c8eb3efce4b7b085a4212ca86e747d74355b5c91a1ec59008b10bfa668841ebccf5159e4a345affbab17d981fa3e87ff78bb67515f12e93a81938987c598de6db193453490aba545", @generic="810618b7ef73318450073642c1ee84b2ed752e29b97a2d4b786a6dea83dd9b765b5483d9bdeb9a77f5d8d3e2fc6a07ef96160d18585b93f7665e157fbd89e70de755fe9578f0093fee6130d8c62f2e8b56fc798cbc4227627e754d73f0170c42c5d7e6b3cc0ef2f45824b260f2241e46ecf236e879b7fe0685c1158127192337881283bee23bc99ba1aee91b763da827bbe11649b95d2b13b4b4eb33e2", @generic="066a04e3a01bcf2b3ccb952036edda367078911f6aeab31bbf3b7320b5de32d29cc3c4824052de38f13d851f6dd33e58a8e7f430a94ea4c10a8ad334a648271fd8bc146baa0aabf4361c49564ee4c4d00b16e0f165446e4d6353c20c0e3e43cf7b3097bf60b5c14e93ae2dfe25be687174fbd81ca5f4475fc24ca2ffd51c08f8ffd02466711920e9c5d9c70aec4a026e9864931eb6af40ce36c218bc93665171", @generic="a167855f083522ec6590af87415e3db76c388fe0f23aaed9ba3dcf3b7914493602005dc2bb538bf02e0f99ac5c2e38e350baf683ee17bc3707a255188584dfd902a77397bb221604c0c0dc1fc839997a2af070946ac2315236ae1b36b0591fbb7ade389fea71e1319c5d1952c6a77a9133efb0fb9b319bad657870097c61f3b284569d2ce3beaccc6704a95df9dc8e89bfc912372a93ec56ec87b9923c7fcc098ee6b7182b4f40da54ff6c24a8891c54cde9793f39a7629420d1d54e83a1cd32f9933251e716a5", @typed={0x14, 0x40, @ipv6=@mcast2}, @generic="4b5eb3a246eb11e0e8784c510050d801aea5a38ae6dcae6084eee035c272058c0b89c3b603238468d6ec92977217922d48ac"]}, @nested={0x44, 0xb, [@typed={0x8, 0x8c, @pid=r4}, @typed={0x8, 0x13, @uid=r5}, @typed={0x14, 0x1a, @ipv6=@mcast1}, @generic="faaf83ccf30a1966dca78cacd3ac78bc059b1d5fbe5421b3695c18"]}]}, 0x3e8}, 0x1, 0x0, 0x0, 0x4010}, 0x800) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000840)=0x1d) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000007c0)={0x20002, 0x0, [0x8, 0x9, 0x80000001, 0xde, 0x5, 0x5, 0x4, 0x5]}) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x4002000000000000]}, 0x10) 13:47:10 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0xfffffe3d) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd401000100ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0x4058534c, &(0x7f0000000080)={0x0, 0x80, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) 13:47:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readlinkat(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/245, 0x369) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000040)={0x4f, 0x4, 0x2, 0x2, 0x3}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x800, 0x7, 0x9beb, 0x4, 0x0, 0x1473, 0x800, 0xb, 0x7, 0x4, 0x8000, 0x1, 0x7, 0x18000000000, 0x46, 0x6, 0x6, 0x4, 0x1, 0x3, 0x8, 0x100000000, 0x5b, 0x0, 0x9, 0x6, 0x83e3, 0x5, 0x4000, 0x8, 0x1, 0x0, 0x5, 0x4eca9cd0, 0x7, 0x2e, 0x0, 0xffffffffffffffe5, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x400, 0x0, 0x100, 0x7, 0x7, 0x7000000000000000, 0x758}, 0xffffffffffffffff, 0x2, 0xffffffffffffff9c, 0x8) 13:47:10 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:47:10 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 13:47:10 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = dup(r0) write(r1, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) ioprio_get$uid(0x3, r2) 13:47:10 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000000000000000000000000000000000008000f800000000000000"], 0x68) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x0) 13:47:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') syz_open_pts(r0, 0x200000) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:10 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) socket(0x13, 0x80007, 0x7f) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:10 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:47:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='net/arp\x00') sendfile(r0, r0, 0x0, 0xa8a) 13:47:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/dev_mcast\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:sshd_exec_t:s0\x00', 0x21) 13:47:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xa000000]}, 0x10) 13:47:11 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) 13:47:11 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 13:47:11 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) socket$netlink(0x10, 0x3, 0xf) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x644e6360, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}}, 0x88) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:11 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x400002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x4b49, 0x0) 13:47:11 executing program 2: r0 = memfd_create(&(0x7f0000000040)='net/ip_tables_targets\x00', 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x7fff, @mcast2, 0x100000001}}, 0x7, 0x3, 0x1f, 0xe9, 0x80}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x618}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000001c0)=0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x20040, 0x0) 13:47:11 executing program 1: r0 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r0, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x20, 0x29, 0x200000000082d, 0x0, 0x0, {0x1}, [@typed={0x8, 0x0, @ipv4}, @nested={0x4}]}, 0x20}}, 0x0) [ 2086.593215] QAT: Invalid ioctl 13:47:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000080)) 13:47:11 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x7, 0x4) r1 = dup2(r0, r0) r2 = dup(r1) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000080)={r3, r4/1000+30000}, 0x10) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:11 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:47:11 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:12 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8102, 0x0) epoll_wait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x6) r1 = socket(0x1000000000000010, 0x80802, 0x0) dup2(r1, r1) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000100)={0x800000000000033, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}]}) socket(0x4, 0x80000, 0x401) r2 = dup(r0) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000040)={0x6, 0x20, 0x9}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @multicast1}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x4, 0x2, [0xf24d, 0x20000000]}, 0xc) 13:47:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) pkey_alloc(0x0, 0x3) 13:47:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xfeffffff]}, 0x10) 13:47:12 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 13:47:12 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:12 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:12 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:47:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) pkey_alloc(0x0, 0x3) 13:47:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680), 0x0) 13:47:12 executing program 3: r0 = socket(0x1000000000000010, 0x80803, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:12 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:12 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:13 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:13 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:47:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x689b9b12]}, 0x10) 13:47:13 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = dup(r0) write(r1, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) pkey_alloc(0x0, 0x3) 13:47:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r1 = semget$private(0x0, 0x0, 0x442) semop(r1, &(0x7f0000000180)=[{0x2, 0x3ff}, {0x0, 0x8, 0x800}, {0x3, 0x1ff, 0x1800}, {0x1, 0x6}, {0x6ce431e16da5724c, 0x12c}], 0x5) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000140)=""/20) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="8a61c1708ca2af18109ea95cc2c3f2c8713aed958920d898e278a461e1ff81fd3ced2be45f42bcd5ae1714cacc67d10ec9098fc6da06e270874661baf73d69b96d8c089f7feedda61546a0ef42a3edbd13a9d882107aca76d117d2a19d9011c7ff466e7d8c47f7f602a320f4e0facd275070670b7702ebba", 0x78}, {&(0x7f00000000c0)="6e888088c422dace12fa1191f408d0", 0xf}], 0x2, 0x0) 13:47:13 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:47:13 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:13 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 13:47:13 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80800, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket(0x1000000000000010, 0x80802, 0x0) r2 = dup2(r1, r1) r3 = dup(r2) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2000, 0x0) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) 13:47:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') sysfs$1(0x1, &(0x7f0000000040)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0xffffffffffffff69}], 0x2) 13:47:13 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:13 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:14 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) 13:47:14 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 13:47:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xa]}, 0x10) 13:47:14 executing program 3: r0 = shmat(0xffffffffffffffff, &(0x7f0000fee000/0xf000)=nil, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000180)={0x34, 0x0, &(0x7f0000000100)}) shmdt(r0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x4) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket(0x1000000000000010, 0x80802, 0x0) r4 = dup2(r3, r3) r5 = dup(r4) write(r5, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000000c0)={r1, &(0x7f0000000080)=""/36}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) r2 = msgget$private(0x0, 0x440) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000100)=""/53) 13:47:14 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:14 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x200, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000002000000018dabe44dab6ce3d925ee15b54cde7867b33a9a3107614c962fe42900a3482f8"], &(0x7f00000001c0)=0x6205513823290fe) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) write$P9_RFSYNC(r0, &(0x7f0000000180)={0x7, 0x33, 0x1}, 0x7) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:14 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:14 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:47:14 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x20, 0x4) 13:47:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) 13:47:14 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680), 0x0) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x101, {0x2, 0x400000004e21, @multicast1}, {0x2, 0x4e20, @empty}, {0x2, 0x4e23, @empty}, 0x80, 0x80, 0x2, 0x401, 0x6, &(0x7f00000000c0)='bond_slave_0\x00', 0x9, 0x7, 0xff}) 13:47:14 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:47:15 executing program 1: ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x6, 0x2, 0x81}) 13:47:15 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:15 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7, 0x10000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000100), &(0x7f00000012c0)=0x4) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0x104, 0x9, {"e473f23508d1e67a2bb5ff82916a94db1ecf2166673bb576c64d11a380024d10f9404cc53b6d1dd1b42d92b7a7219b8d8104deb9b5f9a9ea6a27a1d43a1160e6859bb83a342a2b2f4c7eb645c4ce34146e0062d470afddc29f08da5c4763a0696e2baeb248ca90f581e0c05d25c479dc7558fb3b102dcc45abae6ef9e2f63f42a3c36851f5a522876f819ca4e194a260d72a7f0780dd5353d218ab9b6dac84cdeaf706c3ebc359a62bddeff2edcfd47b8383072972d3bc0f2a72995f687a784fe2c62165ef371a012b30b402abf2329c82dcaf8103ebe4f814fca32477446f115d2ebbe84bc26fe2c6284cba"}}, {0x0, "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"}}, &(0x7f0000000000)=""/116, 0x1106, 0x74, 0x1}, 0x20) 13:47:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x3]}, 0x10) 13:47:15 executing program 2: unshare(0x24020400) r0 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x3f, 0x0) fchown(r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000040)=0x3) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') 13:47:15 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:47:15 executing program 1: ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x6, 0x2, 0x81}) 13:47:15 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:47:15 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000000)="449db90807b2085787e7f04159110c1968fa32779c55ecf64b9c5c540696e2da938c0ccf6e3a0f675ba038c6160d2e7c2b84849ffa752b1c62944ab1d9ec49dc571275a53cfde2a141ad22e3e6e5b801dd9f0cafa40f2cf37988b97ad54d3192fde06b14bf95022f9b182d6af662d31e7094cbdf7436e8fe0045fe4ee96af4a5d7b021603e3817ae0151f3cb8b0527b625e28bbe10f14ac64c057e0f07c3931e157cd80107f8b7878aeb9ded2b17cfbc1d688ccea2022380eda3bcbbaf08a28a89a57eb8f890f8bfecf21e0b0142db7800cbeddfdcea4433c0fe846d446016d753c85d905701039145c4cc11f7e7cbe7d4") write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000001100)=0x1008) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000001180), 0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000001140)={r1, 0x20, 0xfffffffffffffffb}, 0x8) fcntl$setsig(r0, 0xa, 0x25) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x9, 0x2, 0x2, 0x8, 0x100000000, 0x3f, 0x3753}, &(0x7f0000000080)=0x20) 13:47:15 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:15 executing program 1: ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x6, 0x2, 0x81}) 13:47:15 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:47:15 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:15 executing program 2: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip_tables_targets\x00') write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x12c) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x300000000000000]}, 0x10) 13:47:16 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x20) 13:47:16 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:16 executing program 1: r0 = syz_open_procfs(0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) 13:47:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="24000000660007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000040)={0x400, 0xe6, "ae31da13f36aec5066cb7e736d98f23db909b8db803f870e1f0ba57473a1a49466df394889e2377a824c9c46ee9b05d4f9b0bada4ad74e8b5ca364608af8b27f1f59dcc56d61f5dca1893dd079c1eb0fea6a01e97fc4aa5ab9a9458fc837f6d9190ca2243bc4f7a25002737d19163b9696d81f94e777ddf1175a7168310b5d215bec158bea2a4a4bbbd3310225901fe4a0a3489b78e648c493a0b81f6d1d5a3958d1234eea5e4af0f2d1630a196d2334b8ce6d134c8c107b61d02b596f20a3b66c261110aae1f0803cb00fab2dfb488adb3be3bef49d327380a7e7853e69208747a6821ca14d"}) readv(r2, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:16 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:47:16 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:16 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = dup2(r0, r0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:16 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:16 executing program 1: r0 = syz_open_procfs(0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) 13:47:16 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:47:16 executing program 2: rt_sigsuspend(&(0x7f0000000100)={0x7}, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x28, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x293}], 0x1, &(0x7f0000000540)=[{0x0, 0x13d, 0xfffffffffffffff7, "86d8c747d121a517df12e36710bc2454b300476e2071e4ae4f73204e6351a4768742a50050b1f4"}, {0x0, 0x104, 0xfffffffffffffff9, "8c46b665988bfc7b82efc7208b5d76ee78d993feabe835ebdd02e6b5275b4810122d2e12d9bbf3ce3cba8cb49880725d6135c33d71eeef7a8831b81e7f9b881a51f85c36c9f4abba5196ba8185183b4cb6f6596504d78accd10242a606e7022e15618f8f48d3884908306a58ef8bde78cc2e68765012c354b854888a86609374710b3ac8c17dfa2ea56ebb81a5"}]}, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000440)={0x3, 0x8}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) set_thread_area(&(0x7f0000000040)={0x7, 0x1000, 0x5000, 0xffffffff, 0x88, 0x6, 0xfffffffffffffffa, 0x0, 0x80000000, 0x100}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000640)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x83) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000340)={0x0, 0xffff, 0x20}, &(0x7f0000000380)=0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000300)={r4, 0xfffffffffffff88a}, &(0x7f00000002c0)=0xfffffffffffffd7b) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f00000003c0)={0x2, 0x8000, 0x7f, 0x5}) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f00000000c0)=r5, 0x4) readv(r3, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) [ 2091.498293] netlink: 'syz-executor2': attribute type 29 has an invalid length. [ 2091.527949] netlink: 'syz-executor2': attribute type 29 has an invalid length. 13:47:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x9000000]}, 0x10) 13:47:17 executing program 1: r0 = syz_open_procfs(0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) 13:47:17 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:47:17 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000000)=""/85, 0x55}, {&(0x7f0000000180)=""/241, 0xf1}, {&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/41, 0x29}], 0x4, 0x0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x117, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000002c0)=[{0x20, 0x0, [0x9, 0xffffffffffff7814, 0xb69, 0x9846, 0x100, 0x5, 0x5, 0x0, 0xef, 0x511f, 0x401, 0x100, 0x573, 0x6c5, 0xffffffff80000001, 0x200]}], r3, 0x1, 0x1, 0x48}}, 0x20) 13:47:17 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:17 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:47:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) 13:47:17 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x9) 13:47:17 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e0000000000000000040000000040000000000000"], 0x27) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:17 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) [ 2092.293343] netlink: 'syz-executor2': attribute type 29 has an invalid length. 13:47:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) [ 2092.339346] netlink: 'syz-executor2': attribute type 29 has an invalid length. 13:47:17 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') 13:47:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xffffff91]}, 0x10) 13:47:18 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e0000000000000000040000000040000000000000"], 0x27) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:18 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000540)=""/4096}, 0x18) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) open_by_handle_at(r0, &(0x7f0000000000)={0x4e, 0x9, "7345c916e9ab90accb8ed72c7f9c5c5f219c1ca375c59b63a54571db9adbf5c5ced8d6fb76b3c7c26b380f1db6e2e75b5e69bacd1b9bdd0326935b1a7bc3c9495e9a32bbf257"}, 0x4000) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:18 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:47:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x6, 0x2, 0x81}) 13:47:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x30000010}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) 13:47:18 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e0000000000000000040000000040000000000000"], 0x27) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) 13:47:18 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 13:47:18 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/ip_tables_targets\x00') readahead(r1, 0x4, 0x0) readv(r1, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) 13:47:18 executing program 3: socket(0x1000000000000010, 0x80902, 0xf2d) r0 = dup(0xffffffffffffffff) write(r0, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:18 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 2093.329509] [ 2093.336202] ==================================== [ 2093.347441] WARNING: syz-executor5/1901 still has locks held! [ 2093.354951] 4.20.0-rc5+ #361 Not tainted [ 2093.359839] ------------------------------------ [ 2093.364734] 1 lock held by syz-executor5/1901: [ 2093.370330] #0: 000000003d92137a (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 2093.377244] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2093.379900] [ 2093.379900] stack backtrace: [ 2093.387939] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2093.390568] CPU: 1 PID: 1901 Comm: syz-executor5 Not tainted 4.20.0-rc5+ #361 [ 2093.407180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2093.416548] Call Trace: [ 2093.419139] dump_stack+0x244/0x39d [ 2093.422757] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2093.427936] ? vprintk_func+0x85/0x181 [ 2093.431810] debug_check_no_locks_held.cold.49+0x93/0x9f [ 2093.437247] flush_old_exec+0x1ea2/0x2480 [ 2093.441393] ? save_stack+0x43/0xd0 [ 2093.445020] ? __kmalloc+0x15b/0x760 [ 2093.448725] ? copy_strings_kernel+0x110/0x110 [ 2093.453291] ? iov_iter_init+0xe5/0x210 [ 2093.457251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2093.462771] ? __vfs_read+0x11f/0x9b0 [ 2093.466552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2093.472071] ? fsnotify+0x50e/0xef0 [ 2093.475699] ? fsnotify+0xef0/0xef0 [ 2093.479311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2093.484830] ? fsnotify_first_mark+0x350/0x350 [ 2093.489393] ? __fsnotify_parent+0xcc/0x430 [ 2093.493699] ? fsnotify+0xef0/0xef0 [ 2093.497310] ? rw_verify_area+0x118/0x360 [ 2093.501439] ? vfs_read+0x1ce/0x3c0 [ 2093.505048] ? kernel_read+0xab/0x120 [ 2093.508831] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2093.513830] ? load_elf_phdrs+0x1cd/0x260 [ 2093.517957] ? writenote+0x3d0/0x3d0 [ 2093.521677] load_elf_binary+0xa39/0x5620 [ 2093.525823] ? find_held_lock+0x36/0x1c0 [ 2093.529891] ? notesize.isra.6+0x80/0x80 [ 2093.533942] ? ima_file_mmap+0x160/0x160 [ 2093.537987] ? lock_downgrade+0x900/0x900 [ 2093.542134] ? kasan_check_write+0x14/0x20 [ 2093.546352] search_binary_handler+0x17d/0x570 [ 2093.550920] __do_execve_file.isra.33+0x1661/0x25d0 [ 2093.555925] ? prepare_bprm_creds+0x120/0x120 [ 2093.560409] ? usercopy_warn+0x110/0x110 [ 2093.564461] ? check_preemption_disabled+0x48/0x280 [ 2093.569463] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2093.574983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2093.580533] ? strncpy_from_user+0x411/0x5a0 [ 2093.584930] ? digsig_verify+0x1530/0x1530 [ 2093.589160] ? kmem_cache_alloc+0x33a/0x730 [ 2093.593467] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2093.598078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2093.603600] __x64_sys_execveat+0xed/0x130 [ 2093.607823] do_syscall_64+0x1b9/0x820 [ 2093.611694] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2093.617061] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2093.621987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2093.626819] ? trace_hardirqs_on_caller+0x310/0x310 [ 2093.631817] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2093.636813] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2093.641826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2093.646655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2093.651824] RIP: 0033:0x457569 [ 2093.654997] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2093.673875] RSP: 002b:00007fbe4f59ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2093.681560] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 2093.688807] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 2093.696056] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 2093.703317] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbe4f59b6d4 [ 2093.710578] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 00000000ffffffff [ 2093.721434] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2093.728709] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:47:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) 13:47:19 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:47:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000001680)=[{&(0x7f0000001480)=""/96, 0x60}, {&(0x7f0000001500)=""/135, 0x87}], 0x2) fsync(r0) 13:47:19 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x28002) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x4b, 0x200000000000002}], 0xa8) socketpair$inet(0x2, 0x7, 0x40, &(0x7f0000000000)) socket$inet(0x2, 0x90003, 0x1ff) r2 = dup2(r0, r0) r3 = dup(r2) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:19 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0xf0ffffff7f0000]}, 0x10) 13:47:19 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:19 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 2093.922189] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env [ 2093.930006] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:47:19 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:47:19 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) [ 2093.977847] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2093.993592] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2094.005822] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2094.012448] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:47:19 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 2094.029199] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2094.046227] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:47:19 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000"], 0x3c) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:19 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x6, 0x2, 0x81}) [ 2094.080832] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2094.110258] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2094.136243] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2094.149489] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2094.159624] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2094.166134] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2094.175882] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2094.182297] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2094.192127] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2094.198574] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2094.208469] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2094.214884] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2094.225304] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2094.231857] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:47:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x7000000]}, 0x10) 13:47:19 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 13:47:19 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000"], 0x3c) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:19 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xb, 0xd, 0xe, 0x1a, 0x6, 0x772, 0x2, 0x162, 0xffffffffffffffff}) r2 = dup(r1) write(r2, &(0x7f0000000080)="24000000584b6d6f001f02ff075f0b000000000000f51108000201009f08000280010000020008", 0x27) r3 = msgget(0x2, 0x420) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f000028c000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mlock(&(0x7f00004c5000/0x1000)=nil, 0x1000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0xbe, 0x4) msgrcv(r3, &(0x7f00000000c0)={0x0, ""/189}, 0xc5, 0x3, 0x1000) 13:47:19 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x6, 0x2, 0x81}) 13:47:20 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000"], 0x3c) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:20 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) [ 2094.783728] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env [ 2094.800927] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:47:20 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000000000000003"], 0x41) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x6, 0x2, 0x81}) 13:47:20 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) [ 2094.835231] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2094.864104] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:47:20 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000000000000003"], 0x41) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 2094.891610] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2094.908016] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2094.935198] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2094.948432] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2094.959108] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2094.965732] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2094.976407] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2094.985978] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2094.997097] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2095.003531] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2095.014017] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2095.021338] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2095.031549] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2095.038126] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2095.048222] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2095.054634] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:47:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x1800]}, 0x10) 13:47:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x0, 0x2, 0x81}) 13:47:20 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) [ 2095.639868] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env [ 2095.656370] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2095.674448] kobject: 'loop1' (0000000076229154): kobject_uevent_env 13:47:20 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x401) r1 = dup2(r0, r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000001040)='-', 0x1}], 0x1, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) splice(r2, 0x0, r4, 0x0, 0xfff, 0x0) r5 = dup(r1) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) setsockopt$sock_void(r4, 0x1, 0x24, 0x0, 0x0) write(r5, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) ioctl$VIDIOC_S_AUDIO(r5, 0x40345622, &(0x7f0000000000)={0x5, "509c75cbfee67b2d4b94f094647f971568d4382bb7391962a055dac26c95c712", 0x2, 0x1}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x5da, {0x2, 0x4e21, @rand_addr=0x10001}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e22, @empty}, 0x51, 0x5, 0xb82, 0xff, 0x7f, &(0x7f00000000c0)='bond_slave_0\x00', 0x5, 0x7, 0x10000}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) 13:47:20 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:47:20 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000000000000003"], 0x41) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, 0x81}) 13:47:20 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) [ 2095.682332] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2095.705993] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env 13:47:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0}) [ 2095.732006] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2095.763524] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env 13:47:21 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b38000200000000000000030000"], 0x43) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:21 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:47:21 executing program 1: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xb, 0xd, 0xe, 0x1a, 0x6, 0x772, 0x2, 0x162, 0xffffffffffffffff}) r2 = dup(r1) write(r2, &(0x7f0000000080)="24000000584b6d6f001f02ff075f0b000000000000f51108000201009f08000280010000020008", 0x27) r3 = msgget(0x2, 0x420) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f000028c000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mlock(&(0x7f00004c5000/0x1000)=nil, 0x1000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0xbe, 0x4) msgrcv(r3, &(0x7f00000000c0)={0x0, ""/189}, 0xc5, 0x3, 0x1000) [ 2095.790859] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2095.816113] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2095.845054] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2095.866187] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2095.872638] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2095.885373] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2095.892154] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2095.907406] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2095.919598] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2095.931259] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2095.940189] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2095.950606] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2095.957465] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2096.030315] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2096.036910] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:47:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x900000000000000]}, 0x10) 13:47:21 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:21 executing program 3: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0xffffffff, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e24, @remote}, 0x204, 0x6, 0xffff, 0x4, 0x80, 0x0, 0x33c2eb27, 0x5de, 0x5}) r1 = socket(0x1000000000000010, 0x80802, 0x0) r2 = dup2(r1, r1) r3 = dup(r2) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:21 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:47:21 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b38000200000000000000030000"], 0x43) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:21 executing program 1: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xb, 0xd, 0xe, 0x1a, 0x6, 0x772, 0x2, 0x162, 0xffffffffffffffff}) r2 = dup(r1) write(r2, &(0x7f0000000080)="24000000584b6d6f001f02ff075f0b000000000000f51108000201009f08000280010000020008", 0x27) r3 = msgget(0x2, 0x420) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f000028c000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mlock(&(0x7f00004c5000/0x1000)=nil, 0x1000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0xbe, 0x4) msgrcv(r3, &(0x7f00000000c0)={0x0, ""/189}, 0xc5, 0x3, 0x1000) 13:47:21 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b38000200000000000000030000"], 0x43) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:21 executing program 3: r0 = socket(0x100000000000000f, 0x7, 0x0) r1 = dup2(r0, r0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x8}, 0x4) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x84, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x7, @empty, 0x2}, @in6={0xa, 0x4e20, 0xfffffffffffffffc, @remote, 0x9}, @in6={0xa, 0x4e23, 0x2, @loopback, 0x7}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e20, @broadcast}}}, 0x84) [ 2096.466145] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env [ 2096.472663] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:47:21 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:21 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000000000000003000000"], 0x44) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:21 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) [ 2096.525180] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2096.546058] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:47:21 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) dup2(r0, r0) r2 = dup(r0) timerfd_create(0x1, 0x80000) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x29, @multicast2, 0x4e21, 0x2, 'lblcr\x00', 0x12, 0x3ff, 0x1}, 0x2c) [ 2096.578729] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2096.598720] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2096.637374] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2096.657379] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2096.682303] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2096.689572] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2096.700038] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2096.706795] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2096.717998] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2096.724542] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2096.735283] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2096.741784] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2096.752228] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2096.758822] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2096.768803] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2096.775235] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:47:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x40020000]}, 0x10) 13:47:22 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:47:22 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:22 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:22 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = dup(r1) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:22 executing program 1: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xb, 0xd, 0xe, 0x1a, 0x6, 0x772, 0x2, 0x162, 0xffffffffffffffff}) r2 = dup(r1) write(r2, &(0x7f0000000080)="24000000584b6d6f001f02ff075f0b000000000000f51108000201009f08000280010000020008", 0x27) r3 = msgget(0x2, 0x420) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f000028c000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mlock(&(0x7f00004c5000/0x1000)=nil, 0x1000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0xbe, 0x4) msgrcv(r3, &(0x7f00000000c0)={0x0, ""/189}, 0xc5, 0x3, 0x1000) [ 2097.283724] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env 13:47:22 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:47:22 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) [ 2097.326259] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2097.355542] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2097.371284] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:47:22 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:22 executing program 3: r0 = socket(0x2, 0x6, 0x7) r1 = dup2(r0, r0) dup(r1) write(r1, &(0x7f0000000180)="2408000058001f02ff0708fa0023ef000a04f50000dfde613d3603b7d8ae21173d5b993701e6332b871cf5a7b5c8a74f2b7128b2e47b8f63d63f0d65586f1be8c28389b7420e0eb549dec09776d099860ea8320a5d1bec4d17d1a41d792472fc17dd53f8370377c79ed138180343f48016c570cfcfe7e8c626f8b668f23e83ee715c21b25629d574e299b9bc78219cbc4a6f0105b68b565916c2ac8f4e5249c941833eb550b658856236ce8f3c095681c7f446febcfdc3e35cb95c9ef055bfcfaf02e95cecf81cf3528f26a39dbb3038", 0xd0) 13:47:22 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 2097.407233] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2097.434703] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:47:22 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) [ 2097.466190] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2097.480998] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2097.509618] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2097.524900] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2097.550328] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2097.569890] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2097.590111] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2097.605311] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2097.630358] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2097.637409] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2097.648038] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2097.654498] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2097.665150] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2097.672283] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:47:23 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:47:23 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:23 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x10a) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000080)) r2 = dup2(r0, r0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x7) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x281, 0x0) r3 = dup(r2) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 13:47:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x861a0000]}, 0x10) 13:47:23 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:23 executing program 1: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xb, 0xd, 0xe, 0x1a, 0x6, 0x772, 0x2, 0x162, 0xffffffffffffffff}) r2 = dup(r1) write(r2, &(0x7f0000000080)="24000000584b6d6f001f02ff075f0b000000000000f51108000201009f08000280010000020008", 0x27) msgget(0x2, 0x420) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f000028c000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mlock(&(0x7f00004c5000/0x1000)=nil, 0x1000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0xbe, 0x4) [ 2098.146940] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env [ 2098.153390] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:47:23 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:23 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:23 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:47:23 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x101) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x80}, &(0x7f0000000200)=0x8) [ 2098.245387] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2098.258048] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2098.307447] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2098.341553] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:47:23 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 13:47:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000002a0008022abd7000fddbdf2500000000", @ANYRES32=r1, @ANYBLOB="e0ff10000d00060010000100"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4040) r2 = socket(0x1000000000000010, 0x80802, 0x0) r3 = dup2(r2, r2) r4 = dup(r3) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r3, 0x50, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r5, r3, 0x0, 0xb, &(0x7f0000000040)='eth1vmnet0\x00', r6}, 0x30) write(r4, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000380)={0x1, 0x0, [0x1, 0x6, 0xeb0000000000, 0x9, 0xb000000000000000, 0x1000, 0x0, 0x2]}) 13:47:23 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:23 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) [ 2098.392348] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2098.433979] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:47:23 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1"], 0x48) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 2098.486360] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2098.513972] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2098.577318] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2098.601506] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2098.632114] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2098.652110] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2098.675512] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2098.692574] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2098.713734] kobject: 'loop5' (00000000e47cf91f): kobject_uevent_env [ 2098.729870] kobject: 'loop5' (00000000e47cf91f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2098.752428] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2098.766931] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2098.789688] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2098.805027] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2098.826427] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2098.841147] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:47:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x7]}, 0x10) 13:47:24 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:24 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="010000e0eed52a00d7d7c780d531e8f33be03f7f99132e774c5941c5380f418509bede7535e3f66af1f23ffbd5792cace347e5b520c294d302c3d8873ce6a3924277253b59803bb81f692fbcb1e3d6f50130df0b352ee67ea88c95903996f224fe50605519973e23e6c905f2fc95b685a798197dfb41490531872d5cc0750523d2c7"], &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={r2, @in6={{0xa, 0x4e20, 0x81, @local, 0x100}}, 0x1, 0x3, 0x5e1fd133, 0x9, 0x1}, 0x98) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chdir(&(0x7f0000000780)='./file0\x00') open(&(0x7f0000000380)='./bus\x00', 0x47f, 0x0) r4 = dup(r1) write(r4, &(0x7f0000000380)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x417) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e22, 0x0, @mcast1, 0xffffffff}}}, 0x84) 13:47:24 executing program 1: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xb, 0xd, 0xe, 0x1a, 0x6, 0x772, 0x2, 0x162, 0xffffffffffffffff}) r2 = dup(r1) write(r2, &(0x7f0000000080)="24000000584b6d6f001f02ff075f0b000000000000f51108000201009f08000280010000020008", 0x27) msgget(0x2, 0x420) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f000028c000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mlock(&(0x7f00004c5000/0x1000)=nil, 0x1000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) 13:47:24 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) [ 2099.024341] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env [ 2099.065973] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:47:24 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:24 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) fremovexattr(r1, &(0x7f0000000000)=@random={'trusted.', ':\x00'}) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) [ 2099.128225] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2099.138555] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:47:24 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:47:24 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b3800020000"], 0x3b) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) [ 2099.226361] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2099.233080] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:47:24 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:24 executing program 3: r0 = socket(0x11, 0x400000000000807, 0x2) r1 = dup2(r0, r0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21002cbd7000fbdbdf250200000008000400020000000800030033000000080001004e2412000800020002000000080003003f000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x400) getsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f00000001c0)=""/101, &(0x7f0000000240)=0x65) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) [ 2099.299619] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2099.323111] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2099.369437] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2099.383094] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2099.405525] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2099.418298] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2099.441467] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2099.449847] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2099.462583] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2099.469230] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2099.529563] kobject: 'rx-0' (0000000074e0f880): kobject_cleanup, parent 000000002bfd8f0b [ 2099.537903] kobject: 'rx-0' (0000000074e0f880): auto cleanup 'remove' event [ 2099.545040] kobject: 'rx-0' (0000000074e0f880): kobject_uevent_env [ 2099.551448] kobject: 'rx-0' (0000000074e0f880): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 2099.562192] kobject: 'rx-0' (0000000074e0f880): auto cleanup kobject_del [ 2099.569383] kobject: 'rx-0' (0000000074e0f880): calling ktype release [ 2099.575998] kobject: 'rx-0': free name [ 2099.579947] kobject: 'tx-0' (00000000f911e4e8): kobject_cleanup, parent 000000002bfd8f0b [ 2099.588203] kobject: 'tx-0' (00000000f911e4e8): auto cleanup 'remove' event [ 2099.595315] kobject: 'tx-0' (00000000f911e4e8): kobject_uevent_env [ 2099.601715] kobject: 'tx-0' (00000000f911e4e8): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 2099.612180] kobject: 'tx-0' (00000000f911e4e8): auto cleanup kobject_del [ 2099.619085] kobject: 'tx-0' (00000000f911e4e8): calling ktype release [ 2099.625669] kobject: 'tx-0': free name [ 2099.629616] kobject: 'queues' (000000002bfd8f0b): kobject_cleanup, parent (null) [ 2099.638051] kobject: 'queues' (000000002bfd8f0b): calling ktype release [ 2099.644789] kobject: 'queues' (000000002bfd8f0b): kset_release [ 2099.650782] kobject: 'queues': free name [ 2099.655123] kobject: 'syz_tun' (00000000b94ea19c): kobject_uevent_env [ 2099.661771] kobject: 'syz_tun' (00000000b94ea19c): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 2099.671675] kobject: 'syz_tun' (00000000b94ea19c): kobject_cleanup, parent (null) 13:47:24 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002000000000000000300000000"], 0x45) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1"], 0x48) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) [ 2099.680205] kobject: 'syz_tun' (00000000b94ea19c): calling ktype release [ 2099.687123] kobject: 'syz_tun': free name [ 2099.750252] kobject: 'rx-0' (00000000ec10d5a2): kobject_cleanup, parent 00000000aa5111c3 [ 2099.758626] kobject: 'rx-0' (00000000ec10d5a2): auto cleanup 'remove' event [ 2099.766148] kobject: 'rx-0' (00000000ec10d5a2): kobject_uevent_env [ 2099.772592] kobject: 'rx-0' (00000000ec10d5a2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2099.782154] IPVS: ftp: loaded support on port[0] = 21 [ 2099.783094] kobject: 'rx-0' (00000000ec10d5a2): auto cleanup kobject_del [ 2099.794800] kobject: 'rx-0' (00000000ec10d5a2): calling ktype release [ 2099.801501] kobject: 'rx-0': free name [ 2099.805410] kobject: 'tx-0' (000000002c68981b): kobject_cleanup, parent 00000000aa5111c3 [ 2099.813713] kobject: 'tx-0' (000000002c68981b): auto cleanup 'remove' event [ 2099.820943] kobject: 'tx-0' (000000002c68981b): kobject_uevent_env [ 2099.827302] kobject: 'tx-0' (000000002c68981b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2099.837394] kobject: 'tx-0' (000000002c68981b): auto cleanup kobject_del [ 2099.844255] kobject: 'tx-0' (000000002c68981b): calling ktype release [ 2099.850877] kobject: 'tx-0': free name [ 2099.854773] kobject: 'queues' (00000000aa5111c3): kobject_cleanup, parent (null) [ 2099.863201] kobject: 'queues' (00000000aa5111c3): calling ktype release [ 2099.870050] kobject: 'queues' (00000000aa5111c3): kset_release [ 2099.876079] kobject: 'queues': free name [ 2099.880459] kobject: 'ip6gre0' (000000004e110d2b): kobject_uevent_env [ 2099.887074] kobject: 'ip6gre0' (000000004e110d2b): kobject_uevent_env: uevent_suppress caused the event to drop! 13:47:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x0, @rand_addr, [0x0, 0x0, 0x600000000000000]}, 0x10) 13:47:25 executing program 1: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xb, 0xd, 0xe, 0x1a, 0x6, 0x772, 0x2, 0x162, 0xffffffffffffffff}) r2 = dup(r1) write(r2, &(0x7f0000000080)="24000000584b6d6f001f02ff075f0b000000000000f51108000201009f08000280010000020008", 0x27) msgget(0x2, 0x420) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f000028c000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) 13:47:25 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:47:25 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:25 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @empty}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r2, 0x9, 0x40}, &(0x7f0000000180)=0xc) r3 = dup(r1) write(r3, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) [ 2099.898163] kobject: 'rx-0' (000000007acabd6e): kobject_cleanup, parent 00000000753b882d [ 2099.906447] kobject: 'rx-0' (000000007acabd6e): auto cleanup 'remove' event [ 2099.913545] kobject: 'rx-0' (000000007acabd6e): kobject_uevent_env [ 2099.928742] kobject: 'rx-0' (000000007acabd6e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2099.943348] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env 13:47:25 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 13:47:25 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) write(r2, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000000)=""/235, &(0x7f0000000100)=0xeb) [ 2099.957722] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2099.977451] kobject: 'rx-0' (000000007acabd6e): auto cleanup kobject_del [ 2099.991965] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env 13:47:25 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) 13:47:25 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f00000000c0)=@framed={{}, [@map]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xd4, &(0x7f0000000200)=""/212, 0x41100, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) [ 2100.004035] kobject: 'rx-0' (000000007acabd6e): calling ktype release [ 2100.014606] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2100.028586] kobject: 'rx-0': free name [ 2100.036622] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2100.040601] kobject: 'tx-0' (00000000dedca2b7): kobject_cleanup, parent 00000000753b882d [ 2100.057316] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2100.078627] kobject: 'tx-0' (00000000dedca2b7): auto cleanup 'remove' event [ 2100.079019] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env 13:47:25 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup2(r0, r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) r3 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000040)={r1, r1, 0x6}) r4 = dup(r1) write(r4, &(0x7f0000000140)="2400000058001f02ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 13:47:25 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x0) write$P9_RREAD(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="92000000750200870000007939d94fbeda73c435e3d44b05a96f94f0bb7c5f0cc76ec14a0cc5f7cad142403c7bacd94a81180867ab180fe09cbb8201db3497bbe9de17b9e39261c1db3a4b4d52aded956efbe302ace0feb2db29efd424bdcc289b5179afadfb73af6d79b5dfc1fa6b61bfa248a47abc302df3af3eb592adf0e54a573741701186ccd7631c66f3d3f256"], 0x90) [ 2100.103550] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2100.103829] kobject: 'tx-0' (00000000dedca2b7): kobject_uevent_env [ 2100.142500] kobject: 'tx-0' (00000000dedca2b7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2100.151409] kobject: 'loop2' (00000000e4853b90): kobject_uevent_env [ 2100.164862] kobject: 'loop2' (00000000e4853b90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2100.182519] kobject: 'tx-0' (00000000dedca2b7): auto cleanup kobject_del [ 2100.190891] kobject: 'loop0' (0000000079abecf1): kobject_uevent_env [ 2100.203016] kobject: 'loop0' (0000000079abecf1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2100.207438] kobject: 'tx-0' (00000000dedca2b7): calling ktype release [ 2100.216611] kobject: 'loop3' (000000006a6e3ef9): kobject_uevent_env [ 2100.225665] kobject: 'loop3' (000000006a6e3ef9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2100.227110] kobject: 'tx-0': free name [ 2100.247335] kobject: 'queues' (00000000753b882d): kobject_cleanup, parent (null) [ 2100.266729] kobject: 'queues' (00000000753b882d): calling ktype release [ 2100.273567] kobject: 'queues' (00000000753b882d): kset_release [ 2100.279701] kobject: 'queues': free name [ 2100.284029] kobject: 'ip6gretap0' (00000000bc3818fa): kobject_uevent_env [ 2100.291041] kobject: 'ip6gretap0' (00000000bc3818fa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2100.302096] kobject: 'lo' (000000001a8b48ab): kobject_add_internal: parent: 'net', set: 'devices' [ 2100.311879] kobject: 'lo' (000000001a8b48ab): kobject_uevent_env [ 2100.318075] kobject: 'lo' (000000001a8b48ab): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2100.326958] kobject: 'queues' (0000000063c897c4): kobject_add_internal: parent: 'lo', set: '' [ 2100.336194] kobject: 'queues' (0000000063c897c4): kobject_uevent_env [ 2100.342698] kobject: 'queues' (0000000063c897c4): kobject_uevent_env: filter function caused the event to drop! [ 2100.352985] kobject: 'rx-0' (00000000d38eece5): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.362409] kobject: 'rx-0' (00000000d38eece5): kobject_uevent_env [ 2100.368793] kobject: 'rx-0' (00000000d38eece5): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2100.378840] kobject: 'tx-0' (000000004563980e): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.388400] kobject: 'tx-0' (000000004563980e): kobject_uevent_env [ 2100.394739] kobject: 'tx-0' (000000004563980e): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2100.405642] kobject: 'tunl0' (00000000ea3a33d6): kobject_add_internal: parent: 'net', set: 'devices' [ 2100.417030] kobject: 'tunl0' (00000000ea3a33d6): kobject_uevent_env [ 2100.423587] kobject: 'tunl0' (00000000ea3a33d6): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2100.434402] kobject: 'loop1' (0000000076229154): kobject_uevent_env [ 2100.436270] kobject: 'queues' (00000000e553e360): kobject_add_internal: parent: 'tunl0', set: '' [ 2100.440906] kobject: 'loop1' (0000000076229154): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2100.451324] kobject: 'queues' (00000000e553e360): kobject_uevent_env [ 2100.466956] kobject: 'queues' (00000000e553e360): kobject_uevent_env: filter function caused the event to drop! [ 2100.477617] kobject: 'rx-0' (000000001f8ebe42): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.487528] kobject: 'rx-0' (000000001f8ebe42): kobject_uevent_env [ 2100.493861] kobject: 'rx-0' (000000001f8ebe42): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2100.504233] kobject: 'tx-0' (00000000902de24a): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.513744] kobject: 'tx-0' (00000000902de24a): kobject_uevent_env [ 2100.520150] kobject: 'tx-0' (00000000902de24a): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2100.530729] kobject: 'ip6gre0' (000000004e110d2b): kobject_cleanup, parent (null) [ 2100.532066] kobject: 'gre0' (00000000138b543c): kobject_add_internal: parent: 'net', set: 'devices' [ 2100.539253] kobject: 'ip6gre0' (000000004e110d2b): auto cleanup 'remove' event [ 2100.539277] kobject: 'ip6gre0' (000000004e110d2b): kobject_uevent_env [ 2100.539290] kobject: 'ip6gre0' (000000004e110d2b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2100.549869] kobject: 'gre0' (00000000138b543c): kobject_uevent_env [ 2100.555872] kobject: 'ip6gre0' (000000004e110d2b): calling ktype release [ 2100.555895] kobject: 'ip6gre0': free name [ 2100.562802] kobject: 'gre0' (00000000138b543c): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2100.599488] kobject: 'queues' (00000000812b705f): kobject_add_internal: parent: 'gre0', set: '' [ 2100.608898] kobject: 'queues' (00000000812b705f): kobject_uevent_env [ 2100.615393] kobject: 'queues' (00000000812b705f): kobject_uevent_env: filter function caused the event to drop! [ 2100.625675] kobject: 'rx-0' (00000000b79a4c70): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.635090] kobject: 'rx-0' (00000000b79a4c70): kobject_uevent_env [ 2100.641457] kobject: 'rx-0' (00000000b79a4c70): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2100.651701] kobject: 'tx-0' (000000008dbd1fa3): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.661345] kobject: 'tx-0' (000000008dbd1fa3): kobject_uevent_env [ 2100.667729] kobject: 'tx-0' (000000008dbd1fa3): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2100.678492] kobject: 'gretap0' (00000000f1d43bc4): kobject_add_internal: parent: 'net', set: 'devices' [ 2100.689037] kobject: 'gretap0' (00000000f1d43bc4): kobject_uevent_env [ 2100.695672] kobject: 'gretap0' (00000000f1d43bc4): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2100.705435] kobject: 'queues' (000000005db34209): kobject_add_internal: parent: 'gretap0', set: '' [ 2100.715113] kobject: 'queues' (000000005db34209): kobject_uevent_env [ 2100.721689] kobject: 'queues' (000000005db34209): kobject_uevent_env: filter function caused the event to drop! [ 2100.732005] kobject: 'rx-0' (00000000d59e7cf5): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.741500] kobject: 'rx-0' (00000000d59e7cf5): kobject_uevent_env [ 2100.747898] kobject: 'rx-0' (00000000d59e7cf5): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2100.758454] kobject: 'tx-0' (0000000000aca987): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.768040] kobject: 'tx-0' (0000000000aca987): kobject_uevent_env [ 2100.774508] kobject: 'tx-0' (0000000000aca987): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2100.787263] kobject: 'ip6gretap0' (00000000bc3818fa): kobject_cleanup, parent (null) [ 2100.796553] kobject: 'erspan0' (00000000b1652b1c): kobject_add_internal: parent: 'net', set: 'devices' [ 2100.800390] kobject: 'ip6gretap0' (00000000bc3818fa): auto cleanup 'remove' event [ 2100.811333] kobject: 'erspan0' (00000000b1652b1c): kobject_uevent_env [ 2100.814887] kobject: 'loop4' (000000000e8e50c6): kobject_uevent_env [ 2100.820677] kobject: 'erspan0' (00000000b1652b1c): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2100.827057] kobject: 'ip6gretap0' (00000000bc3818fa): kobject_uevent_env [ 2100.837433] kobject: 'queues' (0000000003b389eb): kobject_add_internal: parent: 'erspan0', set: '' [ 2100.843485] kobject: 'loop4' (000000000e8e50c6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2100.853444] kobject: 'queues' (0000000003b389eb): kobject_uevent_env [ 2100.862555] kobject: 'ip6gretap0' (00000000bc3818fa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2100.869174] kobject: 'queues' (0000000003b389eb): kobject_uevent_env: filter function caused the event to drop! [ 2100.884709] kobject: 'ip6gretap0' (00000000bc3818fa): calling ktype release [ 2100.891667] kobject: 'rx-0' (000000000967c944): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.905452] kobject: 'ip6gretap0': free name [ 2100.906731] kobject: 'rx-0' (000000000967c944): kobject_uevent_env [ 2100.917260] kobject: 'rx-0' (000000000967c944): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2100.927778] kobject: 'tx-0' (000000009e7adbdf): kobject_add_internal: parent: 'queues', set: 'queues' [ 2100.937290] kobject: 'tx-0' (000000009e7adbdf): kobject_uevent_env [ 2100.943613] kobject: 'tx-0' (000000009e7adbdf): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2100.955406] kobject: 'ip_vti0' (000000003ec13ff8): kobject_add_internal: parent: 'net', set: 'devices' [ 2100.967057] kobject: 'ip_vti0' (000000003ec13ff8): kobject_uevent_env [ 2100.973653] kobject: 'ip_vti0' (000000003ec13ff8): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2100.983389] kobject: 'queues' (00000000f78c4e71): kobject_add_internal: parent: 'ip_vti0', set: '' [ 2100.993167] kobject: 'queues' (00000000f78c4e71): kobject_uevent_env [ 2101.000198] kobject: 'queues' (00000000f78c4e71): kobject_uevent_env: filter function caused the event to drop! [ 2101.010502] kobject: 'rx-0' (0000000018c5f03f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.019907] kobject: 'rx-0' (0000000018c5f03f): kobject_uevent_env [ 2101.026278] kobject: 'rx-0' (0000000018c5f03f): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2101.037099] kobject: 'tx-0' (00000000b7b50e4a): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.046752] kobject: 'tx-0' (00000000b7b50e4a): kobject_uevent_env [ 2101.053096] kobject: 'tx-0' (00000000b7b50e4a): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2101.066471] kobject: 'rx-0' (0000000033884272): kobject_cleanup, parent 000000005a03b758 [ 2101.074705] kobject: 'rx-0' (0000000033884272): auto cleanup 'remove' event [ 2101.081847] kobject: 'rx-0' (0000000033884272): kobject_uevent_env [ 2101.088277] kobject: 'rx-0' (0000000033884272): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.098355] kobject: 'rx-0' (0000000033884272): auto cleanup kobject_del [ 2101.105202] kobject: 'rx-0' (0000000033884272): calling ktype release [ 2101.111956] kobject: 'rx-0': free name [ 2101.115998] kobject: 'tx-0' (0000000004623bcd): kobject_cleanup, parent 000000005a03b758 [ 2101.124220] kobject: 'tx-0' (0000000004623bcd): auto cleanup 'remove' event [ 2101.131375] kobject: 'tx-0' (0000000004623bcd): kobject_uevent_env [ 2101.137850] kobject: 'tx-0' (0000000004623bcd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.148119] kobject: 'tx-0' (0000000004623bcd): auto cleanup kobject_del [ 2101.154971] kobject: 'tx-0' (0000000004623bcd): calling ktype release [ 2101.161595] kobject: 'tx-0': free name [ 2101.165485] kobject: 'queues' (000000005a03b758): kobject_cleanup, parent (null) [ 2101.173909] kobject: 'queues' (000000005a03b758): calling ktype release [ 2101.180692] kobject: 'queues' (000000005a03b758): kset_release [ 2101.186688] kobject: 'queues': free name [ 2101.191048] kobject: 'ip6tnl0' (0000000093839a5a): kobject_uevent_env [ 2101.197643] kobject: 'ip6tnl0' (0000000093839a5a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.208181] kobject: 'ip6_vti0' (000000008f332a89): kobject_add_internal: parent: 'net', set: 'devices' [ 2101.218532] kobject: 'ip6_vti0' (000000008f332a89): kobject_uevent_env [ 2101.225193] kobject: 'ip6_vti0' (000000008f332a89): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 2101.235137] kobject: 'queues' (00000000096c51ac): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 2101.244889] kobject: 'queues' (00000000096c51ac): kobject_uevent_env [ 2101.251446] kobject: 'queues' (00000000096c51ac): kobject_uevent_env: filter function caused the event to drop! [ 2101.261736] kobject: 'rx-0' (00000000562d0262): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.271211] kobject: 'rx-0' (00000000562d0262): kobject_uevent_env [ 2101.277570] kobject: 'rx-0' (00000000562d0262): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 2101.288142] kobject: 'tx-0' (00000000b9cbe507): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.298040] kobject: 'tx-0' (00000000b9cbe507): kobject_uevent_env [ 2101.304364] kobject: 'tx-0' (00000000b9cbe507): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 2101.316308] kobject: 'ip6tnl0' (0000000093839a5a): kobject_cleanup, parent (null) [ 2101.316404] kobject: 'sit0' (000000007c78e1f0): kobject_add_internal: parent: 'net', set: 'devices' [ 2101.324804] kobject: 'ip6tnl0' (0000000093839a5a): auto cleanup 'remove' event [ 2101.334989] kobject: 'sit0' (000000007c78e1f0): kobject_uevent_env [ 2101.341787] kobject: 'ip6tnl0' (0000000093839a5a): kobject_uevent_env [ 2101.347953] kobject: 'sit0' (000000007c78e1f0): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 2101.354487] kobject: 'ip6tnl0' (0000000093839a5a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.364186] kobject: 'queues' (00000000c7f68bb1): kobject_add_internal: parent: 'sit0', set: '' [ 2101.375106] kobject: 'ip6tnl0' (0000000093839a5a): calling ktype release [ 2101.383815] kobject: 'queues' (00000000c7f68bb1): kobject_uevent_env [ 2101.390900] kobject: 'ip6tnl0': free name [ 2101.397805] kobject: 'queues' (00000000c7f68bb1): kobject_uevent_env: filter function caused the event to drop! [ 2101.411594] kobject: 'rx-0' (00000000c92a69bc): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.421050] kobject: 'rx-0' (00000000c92a69bc): kobject_uevent_env [ 2101.427417] kobject: 'rx-0' (00000000c92a69bc): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 2101.437672] kobject: 'tx-0' (00000000388b4fa7): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.447124] kobject: 'tx-0' (00000000388b4fa7): kobject_uevent_env [ 2101.453433] kobject: 'tx-0' (00000000388b4fa7): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 2101.466177] kobject: 'rx-0' (00000000da058709): kobject_cleanup, parent 00000000bad595bd [ 2101.474387] kobject: 'rx-0' (00000000da058709): auto cleanup 'remove' event [ 2101.481501] kobject: 'rx-0' (00000000da058709): kobject_uevent_env [ 2101.487854] kobject: 'rx-0' (00000000da058709): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.498235] kobject: 'rx-0' (00000000da058709): auto cleanup kobject_del [ 2101.505096] kobject: 'rx-0' (00000000da058709): calling ktype release [ 2101.511752] kobject: 'rx-0': free name [ 2101.515668] kobject: 'tx-0' (00000000203d85a6): kobject_cleanup, parent 00000000bad595bd [ 2101.523940] kobject: 'tx-0' (00000000203d85a6): auto cleanup 'remove' event [ 2101.531832] kobject: 'tx-0' (00000000203d85a6): kobject_uevent_env [ 2101.538204] kobject: 'tx-0' (00000000203d85a6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.548408] kobject: 'tx-0' (00000000203d85a6): auto cleanup kobject_del [ 2101.555262] kobject: 'tx-0' (00000000203d85a6): calling ktype release [ 2101.561852] kobject: 'tx-0': free name [ 2101.565846] kobject: 'queues' (00000000bad595bd): kobject_cleanup, parent (null) [ 2101.574242] kobject: 'queues' (00000000bad595bd): calling ktype release [ 2101.581002] kobject: 'queues' (00000000bad595bd): kset_release [ 2101.586983] kobject: 'queues': free name [ 2101.591230] kobject: 'sit0' (00000000c60e73a2): kobject_uevent_env [ 2101.597563] kobject: 'sit0' (00000000c60e73a2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.607805] kobject: 'ip6tnl0' (0000000041ebd512): kobject_add_internal: parent: 'net', set: 'devices' [ 2101.618238] kobject: 'ip6tnl0' (0000000041ebd512): kobject_uevent_env [ 2101.624818] kobject: 'ip6tnl0' (0000000041ebd512): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 2101.634537] kobject: 'queues' (00000000e4f320d9): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 2101.644209] kobject: 'queues' (00000000e4f320d9): kobject_uevent_env [ 2101.650742] kobject: 'queues' (00000000e4f320d9): kobject_uevent_env: filter function caused the event to drop! [ 2101.661003] kobject: 'rx-0' (00000000a8efd3e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.670469] kobject: 'rx-0' (00000000a8efd3e3): kobject_uevent_env [ 2101.676820] kobject: 'rx-0' (00000000a8efd3e3): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 2101.687336] kobject: 'tx-0' (00000000366a513b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.696817] kobject: 'tx-0' (00000000366a513b): kobject_uevent_env [ 2101.703161] kobject: 'tx-0' (00000000366a513b): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 2101.714120] kobject: 'sit0' (00000000c60e73a2): kobject_cleanup, parent (null) [ 2101.714252] kobject: 'ip6gre0' (00000000e2173a90): kobject_add_internal: parent: 'net', set: 'devices' [ 2101.722416] kobject: 'sit0' (00000000c60e73a2): auto cleanup 'remove' event [ 2101.732661] kobject: 'ip6gre0' (00000000e2173a90): kobject_uevent_env [ 2101.739280] kobject: 'sit0' (00000000c60e73a2): kobject_uevent_env [ 2101.745547] kobject: 'ip6gre0' (00000000e2173a90): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 2101.752082] kobject: 'sit0' (00000000c60e73a2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.762240] kobject: 'queues' (00000000e3ec2dd8): kobject_add_internal: parent: 'ip6gre0', set: '' [ 2101.771886] kobject: 'sit0' (00000000c60e73a2): calling ktype release [ 2101.781306] kobject: 'queues' (00000000e3ec2dd8): kobject_uevent_env [ 2101.788119] kobject: 'sit0': free name [ 2101.794390] kobject: 'queues' (00000000e3ec2dd8): kobject_uevent_env: filter function caused the event to drop! [ 2101.808577] kobject: 'rx-0' (00000000212862d2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.818014] kobject: 'rx-0' (00000000212862d2): kobject_uevent_env [ 2101.824338] kobject: 'rx-0' (00000000212862d2): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 2101.834871] kobject: 'tx-0' (000000009318c82f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2101.844326] kobject: 'tx-0' (000000009318c82f): kobject_uevent_env [ 2101.850686] kobject: 'tx-0' (000000009318c82f): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 2101.863983] kobject: 'rx-0' (000000006cea285b): kobject_cleanup, parent 00000000b6153d9a [ 2101.872223] kobject: 'rx-0' (000000006cea285b): auto cleanup 'remove' event [ 2101.879366] kobject: 'rx-0' (000000006cea285b): kobject_uevent_env [ 2101.885694] kobject: 'rx-0' (000000006cea285b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.895796] kobject: 'rx-0' (000000006cea285b): auto cleanup kobject_del [ 2101.902669] kobject: 'rx-0' (000000006cea285b): calling ktype release [ 2101.909260] kobject: 'rx-0': free name [ 2101.913171] kobject: 'tx-0' (000000001a3b046f): kobject_cleanup, parent 00000000b6153d9a [ 2101.921423] kobject: 'tx-0' (000000001a3b046f): auto cleanup 'remove' event [ 2101.928565] kobject: 'tx-0' (000000001a3b046f): kobject_uevent_env [ 2101.934866] kobject: 'tx-0' (000000001a3b046f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2101.944945] kobject: 'tx-0' (000000001a3b046f): auto cleanup kobject_del [ 2101.952036] kobject: 'tx-0' (000000001a3b046f): calling ktype release [ 2101.958639] kobject: 'tx-0': free name [ 2101.962539] kobject: 'queues' (00000000b6153d9a): kobject_cleanup, parent (null) [ 2101.970965] kobject: 'queues' (00000000b6153d9a): calling ktype release [ 2101.977753] kobject: 'queues' (00000000b6153d9a): kset_release [ 2101.983708] kobject: 'queues': free name [ 2101.988098] kobject: 'ip6_vti0' (00000000a65f2e0b): kobject_uevent_env [ 2101.994747] kobject: 'ip6_vti0' (00000000a65f2e0b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.005429] kobject: 'syz_tun' (00000000dd76775a): kobject_add_internal: parent: 'net', set: 'devices' [ 2102.015386] kobject: 'syz_tun' (00000000dd76775a): kobject_uevent_env [ 2102.022051] kobject: 'syz_tun' (00000000dd76775a): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 2102.031740] kobject: 'queues' (00000000b1f5db1f): kobject_add_internal: parent: 'syz_tun', set: '' [ 2102.041417] kobject: 'queues' (00000000b1f5db1f): kobject_uevent_env [ 2102.047951] kobject: 'queues' (00000000b1f5db1f): kobject_uevent_env: filter function caused the event to drop! [ 2102.058205] kobject: 'rx-0' (000000000a089498): kobject_add_internal: parent: 'queues', set: 'queues' [ 2102.067608] kobject: 'rx-0' (000000000a089498): kobject_uevent_env [ 2102.073923] kobject: 'rx-0' (000000000a089498): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 2102.084406] kobject: 'tx-0' (00000000fa61c5df): kobject_add_internal: parent: 'queues', set: 'queues' [ 2102.093926] kobject: 'tx-0' (00000000fa61c5df): kobject_uevent_env [ 2102.100335] kobject: 'tx-0' (00000000fa61c5df): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 2102.111467] kobject: 'ip6_vti0' (00000000a65f2e0b): kobject_cleanup, parent (null) [ 2102.120151] kobject: 'ip6_vti0' (00000000a65f2e0b): auto cleanup 'remove' event [ 2102.127714] kobject: 'ip6_vti0' (00000000a65f2e0b): kobject_uevent_env [ 2102.134381] kobject: 'ip6_vti0' (00000000a65f2e0b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.145011] kobject: 'ip6_vti0' (00000000a65f2e0b): calling ktype release [ 2102.152777] kobject: 'ip6_vti0': free name [ 2102.159263] kobject: 'rx-0' (000000004519e9fc): kobject_cleanup, parent 00000000ea6a6b6c [ 2102.167532] kobject: 'rx-0' (000000004519e9fc): auto cleanup 'remove' event [ 2102.174927] kobject: 'rx-0' (000000004519e9fc): kobject_uevent_env [ 2102.181345] kobject: 'rx-0' (000000004519e9fc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.191434] kobject: 'rx-0' (000000004519e9fc): auto cleanup kobject_del [ 2102.198436] kobject: 'rx-0' (000000004519e9fc): calling ktype release [ 2102.205021] kobject: 'rx-0': free name [ 2102.209287] kobject: 'tx-0' (000000004cac0d67): kobject_cleanup, parent 00000000ea6a6b6c [ 2102.217556] kobject: 'tx-0' (000000004cac0d67): auto cleanup 'remove' event [ 2102.224682] kobject: 'tx-0' (000000004cac0d67): kobject_uevent_env [ 2102.231136] kobject: 'tx-0' (000000004cac0d67): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.241209] kobject: 'tx-0' (000000004cac0d67): auto cleanup kobject_del [ 2102.248128] kobject: 'tx-0' (000000004cac0d67): calling ktype release [ 2102.254697] kobject: 'tx-0': free name [ 2102.258611] kobject: 'queues' (00000000ea6a6b6c): kobject_cleanup, parent (null) [ 2102.267035] kobject: 'queues' (00000000ea6a6b6c): calling ktype release [ 2102.273766] kobject: 'queues' (00000000ea6a6b6c): kset_release [ 2102.280408] kobject: 'queues': free name [ 2102.284673] kobject: 'ip_vti0' (000000009158ba48): kobject_uevent_env [ 2102.291329] kobject: 'ip_vti0' (000000009158ba48): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.315829] kobject: 'ip_vti0' (000000009158ba48): kobject_cleanup, parent (null) [ 2102.324323] kobject: 'ip_vti0' (000000009158ba48): auto cleanup 'remove' event [ 2102.332035] kobject: 'ip_vti0' (000000009158ba48): kobject_uevent_env [ 2102.338933] kobject: 'ip_vti0' (000000009158ba48): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.349717] kobject: 'ip_vti0' (000000009158ba48): calling ktype release [ 2102.356812] kobject: 'ip_vti0': free name [ 2102.363374] kobject: 'rx-0' (000000007e5e8d43): kobject_cleanup, parent 0000000097e5c290 [ 2102.371672] kobject: 'rx-0' (000000007e5e8d43): auto cleanup 'remove' event [ 2102.378795] kobject: 'rx-0' (000000007e5e8d43): kobject_uevent_env [ 2102.385095] kobject: 'rx-0' (000000007e5e8d43): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.395161] kobject: 'rx-0' (000000007e5e8d43): auto cleanup kobject_del [ 2102.402047] kobject: 'rx-0' (000000007e5e8d43): calling ktype release [ 2102.409237] kobject: 'rx-0': free name [ 2102.413139] kobject: 'tx-0' (000000003219b191): kobject_cleanup, parent 0000000097e5c290 [ 2102.421405] kobject: 'tx-0' (000000003219b191): auto cleanup 'remove' event [ 2102.428559] kobject: 'tx-0' (000000003219b191): kobject_uevent_env [ 2102.434857] kobject: 'tx-0' (000000003219b191): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.444911] kobject: 'tx-0' (000000003219b191): auto cleanup kobject_del [ 2102.451778] kobject: 'tx-0' (000000003219b191): calling ktype release [ 2102.458372] kobject: 'tx-0': free name [ 2102.462285] kobject: 'queues' (0000000097e5c290): kobject_cleanup, parent (null) [ 2102.470696] kobject: 'queues' (0000000097e5c290): calling ktype release [ 2102.477472] kobject: 'queues' (0000000097e5c290): kset_release [ 2102.483437] kobject: 'queues': free name [ 2102.488338] kobject: 'erspan0' (0000000034c7986a): kobject_uevent_env [ 2102.494903] kobject: 'erspan0' (0000000034c7986a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.525836] kobject: 'erspan0' (0000000034c7986a): kobject_cleanup, parent (null) [ 2102.534389] kobject: 'erspan0' (0000000034c7986a): auto cleanup 'remove' event [ 2102.542706] kobject: 'erspan0' (0000000034c7986a): kobject_uevent_env [ 2102.549581] kobject: 'erspan0' (0000000034c7986a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.560221] kobject: 'erspan0' (0000000034c7986a): calling ktype release [ 2102.567458] kobject: 'erspan0': free name [ 2102.574345] kobject: 'rx-0' (000000002439c6bb): kobject_cleanup, parent 000000009952f6c3 [ 2102.582815] kobject: 'rx-0' (000000002439c6bb): auto cleanup 'remove' event [ 2102.589974] kobject: 'rx-0' (000000002439c6bb): kobject_uevent_env [ 2102.596323] kobject: 'rx-0' (000000002439c6bb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.606388] kobject: 'rx-0' (000000002439c6bb): auto cleanup kobject_del [ 2102.613254] kobject: 'rx-0' (000000002439c6bb): calling ktype release [ 2102.619857] kobject: 'rx-0': free name [ 2102.623792] kobject: 'tx-0' (0000000066cdc06d): kobject_cleanup, parent 000000009952f6c3 [ 2102.632028] kobject: 'tx-0' (0000000066cdc06d): auto cleanup 'remove' event [ 2102.639130] kobject: 'tx-0' (0000000066cdc06d): kobject_uevent_env [ 2102.645427] kobject: 'tx-0' (0000000066cdc06d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.655538] kobject: 'tx-0' (0000000066cdc06d): auto cleanup kobject_del [ 2102.662465] kobject: 'tx-0' (0000000066cdc06d): calling ktype release [ 2102.669755] kobject: 'tx-0': free name [ 2102.673639] kobject: 'queues' (000000009952f6c3): kobject_cleanup, parent (null) [ 2102.682063] kobject: 'queues' (000000009952f6c3): calling ktype release [ 2102.688835] kobject: 'queues' (000000009952f6c3): kset_release [ 2102.694798] kobject: 'queues': free name [ 2102.699222] kobject: 'gretap0' (00000000ffec4e72): kobject_uevent_env [ 2102.705827] kobject: 'gretap0' (00000000ffec4e72): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.735690] kobject: 'ip6gretap0' (000000001d024794): kobject_add_internal: parent: 'net', set: 'devices' [ 2102.746410] kobject: 'ip6gretap0' (000000001d024794): kobject_uevent_env [ 2102.753267] kobject: 'ip6gretap0' (000000001d024794): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 2102.763697] kobject: 'queues' (000000004fdd8b01): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 2102.773638] kobject: 'queues' (000000004fdd8b01): kobject_uevent_env [ 2102.780207] kobject: 'queues' (000000004fdd8b01): kobject_uevent_env: filter function caused the event to drop! [ 2102.790474] kobject: 'rx-0' (000000007b42cd24): kobject_add_internal: parent: 'queues', set: 'queues' [ 2102.799881] kobject: 'rx-0' (000000007b42cd24): kobject_uevent_env [ 2102.806329] kobject: 'rx-0' (000000007b42cd24): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 2102.817081] kobject: 'tx-0' (00000000c72105de): kobject_add_internal: parent: 'queues', set: 'queues' [ 2102.826760] kobject: 'tx-0' (00000000c72105de): kobject_uevent_env [ 2102.833079] kobject: 'tx-0' (00000000c72105de): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 2102.844461] kobject: 'gretap0' (00000000ffec4e72): kobject_cleanup, parent (null) [ 2102.853020] kobject: 'gretap0' (00000000ffec4e72): auto cleanup 'remove' event [ 2102.860658] kobject: 'gretap0' (00000000ffec4e72): kobject_uevent_env [ 2102.867550] kobject: 'gretap0' (00000000ffec4e72): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2102.875880] kobject: 'bridge0' (00000000999e61cf): kobject_add_internal: parent: 'net', set: 'devices' [ 2102.878181] kobject: 'gretap0' (00000000ffec4e72): calling ktype release [ 2102.888375] kobject: 'bridge0' (00000000999e61cf): kobject_uevent_env [ 2102.894308] kobject: 'gretap0': free name [ 2102.900843] kobject: 'bridge0' (00000000999e61cf): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 2102.914751] kobject: 'queues' (00000000bc57fd2a): kobject_add_internal: parent: 'bridge0', set: '' [ 2102.924439] kobject: 'queues' (00000000bc57fd2a): kobject_uevent_env [ 2102.930963] kobject: 'queues' (00000000bc57fd2a): kobject_uevent_env: filter function caused the event to drop! [ 2102.941227] kobject: 'rx-0' (000000009804261a): kobject_add_internal: parent: 'queues', set: 'queues' [ 2102.950633] kobject: 'rx-0' (000000009804261a): kobject_uevent_env [ 2102.957025] kobject: 'rx-0' (000000009804261a): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 2102.967502] kobject: 'tx-0' (0000000069b2fe69): kobject_add_internal: parent: 'queues', set: 'queues' [ 2102.977134] kobject: 'tx-0' (0000000069b2fe69): kobject_uevent_env [ 2102.983463] kobject: 'tx-0' (0000000069b2fe69): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 2102.994851] kobject: 'brif' (000000003a4b6c46): kobject_add_internal: parent: 'bridge0', set: '' [ 2103.007189] kobject: 'rx-0' (0000000033f9ea6a): kobject_cleanup, parent 0000000030e525be [ 2103.015434] kobject: 'rx-0' (0000000033f9ea6a): auto cleanup 'remove' event [ 2103.022771] kobject: 'rx-0' (0000000033f9ea6a): kobject_uevent_env [ 2103.029383] kobject: 'rx-0' (0000000033f9ea6a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2103.039701] kobject: 'rx-0' (0000000033f9ea6a): auto cleanup kobject_del [ 2103.046820] kobject: 'rx-0' (0000000033f9ea6a): calling ktype release [ 2103.053382] kobject: 'rx-0': free name [ 2103.057329] kobject: 'tx-0' (00000000b5646231): kobject_cleanup, parent 0000000030e525be [ 2103.065554] kobject: 'tx-0' (00000000b5646231): auto cleanup 'remove' event [ 2103.072672] kobject: 'tx-0' (00000000b5646231): kobject_uevent_env [ 2103.079041] kobject: 'tx-0' (00000000b5646231): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2103.089590] kobject: 'tx-0' (00000000b5646231): auto cleanup kobject_del [ 2103.096500] kobject: 'tx-0' (00000000b5646231): calling ktype release [ 2103.103071] kobject: 'tx-0': free name [ 2103.106996] kobject: 'queues' (0000000030e525be): kobject_cleanup, parent (null) [ 2103.115393] kobject: 'queues' (0000000030e525be): calling ktype release [ 2103.122168] kobject: 'queues' (0000000030e525be): kset_release [ 2103.128150] kobject: 'queues': free name [ 2103.132404] kobject: 'gre0' (0000000019738848): kobject_uevent_env [ 2103.138739] kobject: 'gre0' (0000000019738848): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2103.150700] kobject: 'vcan0' (000000000aa08ef0): kobject_add_internal: parent: 'net', set: 'devices' [ 2103.160516] kobject: 'vcan0' (000000000aa08ef0): kobject_uevent_env [ 2103.166986] kobject: 'vcan0' (000000000aa08ef0): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 2103.176385] kobject: 'queues' (00000000ca1c57b0): kobject_add_internal: parent: 'vcan0', set: '' [ 2103.185974] kobject: 'queues' (00000000ca1c57b0): kobject_uevent_env [ 2103.192467] kobject: 'queues' (00000000ca1c57b0): kobject_uevent_env: filter function caused the event to drop! [ 2103.202741] kobject: 'rx-0' (0000000057a1c3eb): kobject_add_internal: parent: 'queues', set: 'queues' [ 2103.212175] kobject: 'rx-0' (0000000057a1c3eb): kobject_uevent_env [ 2103.218554] kobject: 'rx-0' (0000000057a1c3eb): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 2103.228834] kobject: 'tx-0' (00000000d8a8b176): kobject_add_internal: parent: 'queues', set: 'queues' [ 2103.238408] kobject: 'tx-0' (00000000d8a8b176): kobject_uevent_env [ 2103.244729] kobject: 'tx-0' (00000000d8a8b176): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 2103.255395] kobject: 'gre0' (0000000019738848): kobject_cleanup, parent (null) [ 2103.263724] kobject: 'gre0' (0000000019738848): auto cleanup 'remove' event [ 2103.271944] kobject: 'gre0' (0000000019738848): kobject_uevent_env [ 2103.278517] kobject: 'gre0' (0000000019738848): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2103.288630] kobject: 'gre0' (0000000019738848): calling ktype release [ 2103.295225] kobject: 'gre0': free name [ 2103.297344] kobject: 'bond0' (00000000e547cddc): kobject_add_internal: parent: 'net', set: 'devices' [ 2103.309398] kobject: 'bond0' (00000000e547cddc): kobject_uevent_env [ 2103.315856] kobject: 'bond0' (00000000e547cddc): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 2103.325173] kobject: 'queues' (00000000b354c390): kobject_add_internal: parent: 'bond0', set: ''