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", 0x1000}, {&(0x7f0000001480)="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", 0x1000}], 0x5, 0x0, 0x0, 0x40010}, 0x20000040) 16:39:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x200000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5600000000000000e9bfd1586e13cde58b6a46c611c2e2d563d14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$inet6(r1, &(0x7f0000000040)=""/2, 0x2, 0x40002140, &(0x7f00000000c0)={0xa, 0x4e22, 0x400, @local, 0x7}, 0x1c) 16:39:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x2a0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:19 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80003001009ffeb0800010000000100", 0x24) 16:39:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d00000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sysfs$2(0x2, 0x4, &(0x7f0000000380)=""/4096) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:19 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80005001009ffeb0800010000000100", 0x24) 16:39:19 executing program 5: r0 = epoll_create(0x4eb1) r1 = epoll_create(0x7) r2 = epoll_create(0x800f61) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xfe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f00000002c0)={0x0, 0x0, {0x2, 0x3, 0x9, 0x0, 0x5}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x38e, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x3f00000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000000c0)=""/51) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80006001009ffeb0800010000000100", 0x24) 16:39:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x3f00, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x1b) 16:39:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x4000000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e8000a001009ffeb0800010000000100", 0x24) 16:39:20 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x2) accept4$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0}, &(0x7f0000001f40)=0x14, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000004e628fb5a4e47f6ce4c59d81dec4341367adcc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='GPL\x00', 0x0, 0x226, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x7, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1ff, 0x41b1d8b21836ef48) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req3={0xffffffff, 0x42, 0x80, 0x4, 0x2f3, 0x6}, 0x1c) 16:39:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d00000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x4000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x6000000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e8000c001009ffeb0800010000000100", 0x24) 16:39:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000300000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000009fa0f7d43c3c97fda4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x1f) 16:39:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e8000f001009ffeb0800010000000100", 0x24) 16:39:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8100000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df7002000000efabd14fdc99a86ead4e9d"], &(0x7f0000000040)='syzka\xf6\xd2e\xa1\xa0\x04\xbf\xdd\xef\x97\x8bu\xae\xf3\x9a0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) r4 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffffffb, 0x40000) sendmsg$nl_route(r4, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000280}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newrule={0x30, 0x20, 0x4, 0x70bd27, 0x25dfdbfd, {0xa, 0xa0, 0x80, 0x6, 0x923b, 0x0, 0x0, 0x7, 0x13}, [@FIB_RULE_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0x2}, @FIB_RULE_POLICY=@FRA_IP_PROTO={0x8, 0x16, 0x3c}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x12d048c27742e8a3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x88a8000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8100, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:20 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80040001009ffeb0800010000000100", 0x24) 16:39:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e88847001009ffeb0800010000000100", 0x24) 16:39:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x18000, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x1, &(0x7f0000000100)=[{&(0x7f0000000380)="6f415a5742a93ea8cf2f7bda8948fe9f80472b7ff2180442b4c155035ab2eedb5fc15b71bed693421c80624061380ac871fdd08e999015a56d481e7afdff3eb4075bb6eb8c5cd50932efebfc76f4984a9843a85faaf427f7bbde1cf9b44d2281e5fd66cac119aca5b791d0dd82b7ca69719319ac95b0592b4293be77794f241c0c17a614a626e424c873f2c23a58af1d50301d453bdd393068970cd7a82c9b4f85f592f3092603", 0xa7, 0x7f}], 0x2010, &(0x7f0000000440)={[{@file_umask={'file_umask', 0x3d, 0xfffffffffffffffe}}, {@codepage={'codepage', 0x3d, 'cp1255'}}, {@creator={'creator', 0x3d, "56d7fb5d"}}, {@file_umask={'file_umask', 0x3d, 0x99}}, {@type={'type', 0x3d, "2a3ef1b6"}}, {@type={'type', 0x3d, "497215d8"}}, {@quiet='quiet'}, {@umask={'umask', 0x3d, 0x7f}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@pcr={'pcr', 0x3d, 0x36}}, {@appraise='appraise'}, {@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@hash='hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role'}}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) restart_syscall() 16:39:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xfffffffffffffeca, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e88848001009ffeb0800010000000100", 0x24) 16:39:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8e03, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 5: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x10000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000000000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640500000000006504040001008000000000000000800000050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = dup3(r0, r0, 0x80000) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x7ff, 0x9, [0x7e, 0x9, 0x5, 0x81, 0x800], 0xb9}) prctl$PR_GET_DUMPABLE(0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000000c0)=""/40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x88a8ffff00000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e86558001009ffeb0800010000000100", 0x24) 16:39:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'ip6gre0\x00', 0x90a}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xa, &(0x7f0000000080)="52d3804e7fff0000ad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x6, 0x0) timerfd_settime(r1, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8000a0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() dup2(r0, r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x840, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f00000000c0)={{0x7ff, 0x8001, 0xa0, 0xffffffff, 0x7, 0x2}, 0x87c}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80060001009ffeb0800010000000100", 0x24) 16:39:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8e03000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x1000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e85865001009ffeb0800010000000100", 0x24) 16:39:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x400, 0x100) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000280)=0x8, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x1e9, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d815adec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d0000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000003c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000400)=0xff) getgid() r1 = syz_open_dev$swradio(&(0x7f00000004c0)='/dev/swradio#\x00', 0x1, 0x2) fchmodat(r1, &(0x7f0000000380)='./file0\x00', 0x60) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="b202000011000000bf080000000000000603000000feffff7a0af0fff8ffffff86a4f0ff0000002d3e311dffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c504f0f50276fa5cd3cc49bd5c325274776499a3e9bfd9586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55ef0000000000000024a314c581d8dc243f0a5cb2c69e5362f29f7e39c00cd25d6c6b1d256fc4c0a2a23a4a5cb7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xfffffffffffffe31, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x70) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000000100900189bc4a8fa1a30568248b7b9ba483e466b7da5824589eb1f05d138a5330190d69c81c9860e07e8a5563f8abe28807230f61db0351caca8dfa849a2db9288568fa0b6efd8de92970ab1c4c6cf3380e329283b16de18f69b5e07049bc3be02b6eee0d4f26c73846572f615aab4b38d84b9684337d3883c6deb968a3b54cfc5ce02b974d8543b7d1bbaed586440c02d663c7e73de44e5563fc1e87278d3fb67f5c07118db9903f81acad5d54c317add12112f1a5c3761e0"], &(0x7f0000000100)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x10001, 0x3, 0x8, 0x3, 0x591, "e06954574cccf15ced2354b6659ed6ade1c613", 0x4, 0x4e}) 16:39:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d64050000000000650404b7050000000000006a0a00fe00000000850000001200000a72de5d00b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d36be34136297ebc2036ecf11d6a6e676f6558474725915f70a2f094525f25f7c56038d11108c3f5ed7776ab2be999ba3088753dc169e82f3876f92ad1030"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x201, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x3) 16:39:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xfeffffff00000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80081001009ffeb0800010000000100", 0x24) 16:39:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffffff00000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000980)={r0, 0x0, 0xfffffead, 0x0, &(0x7f00000009c0)="52d3814e7fffff3bad6c48eff04c", 0x0, 0xdd4}, 0x28) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0}, &(0x7f0000000880)=0xc) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8000) epoll_wait(r3, &(0x7f00000008c0)=[{}], 0x1, 0x20) r4 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x4d, 0x4, &(0x7f0000000100)=[{&(0x7f0000000380)="9f76eaae40ac74e5977e3481a9f8fabaf38183ca523698b1e0703c31114aa48af28518a9535bb03ef134dd9a415fe9a317e8626bb3689cc7f6443baa18592a193a480c3dae8be7c135fd2613e82fdf66d21c8c2269029a8e952069dc1ae9948354d089e30d5b89995309e1fcd7ebbaa791c95fae4b3dc0d27db6e21f0f0e9c28ccbd55102461f14b4cb62c90f9", 0x8d, 0x8f4}, {&(0x7f0000000440)="68b08f6bb123f6d3729bffa98b0ad30a8e8c2412c3d6e6fb33c6b35a8942b4cf328c0e0bdd1c9d851f593bb3340e550d1d3addc5a53db155a2f5573c2b40fc65d6a3ca20f939d7d52e862461100731a7ac0c66fca131584babc0b89ba11f0ffa4cd1ad2f26fdd5915f126e65656e18d63fa6c92baa67048284843ad4f1b2db6f32e74d6d14559b867e735bc5bb9dda73069c77fa7786e10f738dabf9f0fd8ed9cbf8df8c42db028c4fe0965b41b098bedc88deb7b47d13c120daab61e8d7b283028c0ad27245630cf2780236e859cbe241836f07d5509e4e07796a7a3e9722a4f46e", 0xe2}, {&(0x7f0000000540)="a1383600502da07cb1c0099ba48705bf9e2638f22e16cd03c0711463cb2727043ba3e43925c4dd3f56d4e42217c2cd815461121865585c44a457d797f88590feaddefb26c838fcf160ca4028a537a1a062cf06ca2d6e3f8220a4946f0d4cb284e0837601820ee697b43099f6d75e7940d0dbc797a1497dc59717ee3399114137a6a5cdf8e8c8349e60962f070322149cbbc43403b9d10b75bedf89387dc570eea1aaa999b1557ea97c43057b63751ac13b2d246ca4216667d3478ba28d15f5202e8581670fb7d731", 0xc8, 0x2}, {&(0x7f0000000640)="63aa943fad48bbbea4de0b0ba457e9a16096c459a1944b971b81c08c7b6a3f1dff74fccc891ff27cc3b1c0a01920f429408c9114ce99486196284cfe30e34da7e5b003a3e968edf497c1ed6b22f5cfa13f08ab63e67e16d80200e785fd92ab8efa20c7c64e3bbf52735fbfb1fe0bab452251de451f73eef1b04e8653af82b32c21", 0x81, 0x7}], 0x800000, &(0x7f0000000a00)=ANY=[@ANYBLOB='usrjquota=,euid=', @ANYRESDEC=r1, @ANYBLOB="fabcb0aba665726af44348d67bda160efa3d8682155d73135975b58ed933709c887c0c44548227c97d7678a1e835b6ef7bea69933b980219640dd359ca609f9d06fc57b01f191e00d6e26795019d59b3be8dcc1cdc4217e260133d", @ANYRESDEC=r2, @ANYBLOB=',fsmagic=0x00000000000003ff,hash,smackfsroot=[&security)bdev,obj_role=syzkaller\x00,fowner>', @ANYRESDEC=r4, @ANYBLOB=',hash,\x00']) 16:39:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x2000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000080)={0x1ff, 0x4, 0x5, 0x8, 0x3ff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x1b8, r2, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x4}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x2e}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5d}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe91e}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x69f}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1210}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x240}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2b}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x27}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8d9}, 0x28) 16:39:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x3f000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:22 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000500)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000000c0)={@loopback, @loopback}, 0x5) getgid() r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, r2, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x81}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0xc014) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e84788001009ffeb0800010000000100", 0x24) 16:39:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffffffa0008000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xfffffe58, 0x0, &(0x7f00000000c0)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x7fffffff}, 0xfffffffffffffe59) 16:39:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x40000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e84888001009ffeb0800010000000100", 0x24) [ 221.452772][T14833] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 16:39:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0xfffffffffffffe14) [ 221.503376][T14833] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 16:39:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 221.555946][T14833] F2FS-fs (loop0): Unable to read 2th superblock 16:39:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800e8001009ffeb0800010000000100", 0x24) [ 221.742467][T14833] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 221.768935][T14833] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 221.788481][T14833] F2FS-fs (loop0): Unable to read 2th superblock 16:39:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200000, 0x0) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f00000000c0)=@caif=@dgm, 0x80, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)=""/19, 0x13}, {&(0x7f00000003c0)=""/72, 0x48}, {&(0x7f0000000440)=""/223, 0xdf}], 0x4, &(0x7f0000000580)=""/174, 0xae}, 0x2002) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x30b, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48ef054c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x14000, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x7, 0xffffffffffffffff, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065070400010000000404000001000000b705000000000000060000fe000000008500000012000000b7000080000000009500000000000098460eda14bb43ad0da57a0f42004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x60000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000004009ffeb0800010000000100", 0x24) 16:39:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0xabf) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 16:39:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80002001009ffeb0800010000000100", 0x24) 16:39:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c325274ad71c51b207764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) getgroups(0x6, &(0x7f0000000040)=[r0, r0, r0, r0, r0, r0]) 16:39:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x81000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000000c0)=[{r0, 0x1}, {r0, 0x8200}, {r0, 0x1000}, {r0, 0x8000}, {r0, 0x8000}, {r0, 0x85a42c5be1bc958a}, {r0, 0x400}, {r0, 0x4}, {r0, 0xeb3e078c7c625db2}], 0x9, &(0x7f0000000040)={0x77359400}, &(0x7f0000000140)={0x4}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x5d4f8f480d0414da, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 16:39:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80003001009ffeb0800010000000100", 0x24) 16:39:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2}, 0x28) 16:39:23 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getgid() r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xd1, 0x2) fstat(r2, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000140)={@empty, 0x10000, 0xbc90971971304efb, 0x2, 0x8, 0x3, 0x3}, 0x20) write$P9_RSTATu(r3, &(0x7f0000000400)={0x9a, 0x7d, 0x2, {{0x0, 0x6a, 0x3, 0x100000000000, {0x0, 0x1}, 0x1000000, 0x8, 0x7fffffff, 0x0, 0xa, 'syzkaller\x00', 0x19, ':}vboxnet1{cpuseteth0:{#:', 0xa, 'syzkaller\x00', 0xa, 'syzkaller\x00'}, 0x1b, 'cgroupnodevposix_acl_access', r4, r1, r5}}, 0x9a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002f80)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000040)=""/58, 0x3a}, {&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000380)=""/7, 0x7}, {&(0x7f00000003c0)=""/41, 0x29}, {&(0x7f0000000400)=""/197, 0xc5}, {&(0x7f0000000500)=""/158, 0x9e}, {&(0x7f00000005c0)=""/210, 0xd2}, {&(0x7f00000006c0)=""/219, 0xdb}, {&(0x7f00000007c0)=""/250, 0xfa}], 0x9, &(0x7f0000000980)=""/3, 0x3}, 0x8000}, {{&(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/83, 0x53}, {&(0x7f0000000ac0)=""/133, 0x85}, {&(0x7f0000000b80)=""/93, 0x5d}, {&(0x7f0000000c00)=""/31, 0x1f}, {&(0x7f0000000c40)=""/167, 0xa7}, {&(0x7f0000000d00)=""/23, 0x17}, {&(0x7f0000000d40)=""/139, 0x8b}, {&(0x7f0000000e00)=""/144, 0x90}, {&(0x7f0000000ec0)=""/46, 0x2e}, {&(0x7f0000000f00)=""/238, 0xee}], 0xa}, 0x5}, {{&(0x7f00000010c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001140)=""/122, 0x7a}, {&(0x7f00000011c0)=""/179, 0xb3}], 0x2}, 0x8}, {{&(0x7f00000012c0)=@can, 0x80, &(0x7f0000001840)=[{&(0x7f0000001340)=""/212, 0xd4}, {&(0x7f0000001440)=""/211, 0xd3}, {&(0x7f0000001540)=""/152, 0x98}, {&(0x7f0000001600)=""/229, 0xe5}, {&(0x7f0000001700)=""/159, 0x9f}, {&(0x7f00000017c0)=""/86, 0x56}], 0x6}}, {{&(0x7f00000018c0)=@ax25={{0x3, @rose}, [@netrom, @bcast, @remote, @remote, @remote, @remote, @null, @null]}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001940)=""/195, 0xc3}, {&(0x7f0000001a40)=""/103, 0x67}, {&(0x7f0000001ac0)=""/80, 0x50}, {&(0x7f0000001b40)=""/73, 0x49}], 0x4, &(0x7f0000001c00)=""/214, 0xd6}, 0x9}, {{&(0x7f0000001d00)=@alg, 0x80, &(0x7f0000002f40)=[{&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/98, 0x62}, {&(0x7f0000002e00)=""/48, 0x30}, {&(0x7f0000002e40)=""/223, 0xdf}], 0x4}, 0x3000000000000}], 0x6, 0x1, &(0x7f0000003100)) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000003140)=0x6, 0x4) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80004001009ffeb0800010000000100", 0x24) 16:39:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d64050000000000650404000100b7762f74c0c235ba4914e8690048c40600000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000003448cc0b0000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40400, 0x1) ioctl$RTC_VL_CLR(r1, 0x7014) pause() 16:39:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x88a8ffff, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xffffffffffffff8d, 0x200) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x60}, 0x28) 16:39:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) memfd_create(&(0x7f0000000040)='@GPL\\user:.cpusetvmnet0ppp0--\x00', 0x4) 16:39:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80005001009ffeb0800010000000100", 0x24) 16:39:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x38e}, 0x28) 16:39:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80006001009ffeb0800010000000100", 0x24) 16:39:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() accept4(0xffffffffffffffff, &(0x7f0000000400)=@hci={0x1f, 0x0}, &(0x7f0000000480)=0x80, 0x800) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10}, 0x124) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8e030000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:23 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x9, 0x101800) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)=0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x100000000, 0xffff, 0x8, 0x7, 0x80, 0xe90, 0x8, 0x1, 0xca, 0x0, 0x4}, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f00000000c0)={0x5, 0xffffffffffffffff, {0x51, 0x9, 0xa6a, {0x1, 0x3}, {0x2, 0x20}, @const={0x100000000, {0x4, 0xffffffff, 0x7fffffff, 0x8}}}, {0x56, 0x54, 0x4093, {0x2, 0xffffffffffff8001}, {0xde66, 0x7f}, @rumble={0x2, 0x8}}}) 16:39:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000000c0)={0x1, 0x0, [{}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e8000a001009ffeb0800010000000100", 0x24) 16:39:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000002e004e628fb5a4e47f6ca4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df701f5c829a4f994c4f5edf2f55efabd1"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x9, 0x189c41) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r2, 0x10, 0x70bd27, 0x3, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9918}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x845) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0x6, 0x7, 0xffffffffffff16f5, 0x7fff, '\x00', 0x200}, 0x1, [0x10001, 0x9, 0x6, 0x8, 0xee0, 0x8, 0x6, 0x3ff, 0x7fff, 0xff, 0x8001, 0x6, 0x7fffffff, 0xf153, 0x7ff, 0x3, 0x4, 0x3, 0x80, 0xa219, 0xff, 0x5, 0x80, 0x101, 0x6, 0x2, 0x78b, 0xfffffffffffffffe, 0xfffffffffffffffa, 0x8, 0x0, 0xffffffffffffffbd, 0x2e, 0xb95, 0xffffffff, 0x5, 0x221, 0x7ff, 0x80000000, 0x3, 0x0, 0x9, 0x8e, 0x101, 0x0, 0x2, 0x1, 0x6ee, 0x81, 0x7, 0x5, 0xfff, 0x5, 0xcc9, 0x6, 0x400, 0x48a, 0x100, 0x80, 0x18aefbeb, 0x1, 0x1, 0x0, 0x40, 0x0, 0x3, 0x5a0, 0x6, 0x1, 0x1, 0x2, 0x5, 0x9, 0x6, 0x400, 0xb4df, 0xd9, 0x2, 0x7, 0x2, 0x9354, 0x3, 0x0, 0x0, 0xa8, 0x1d4771bc, 0x0, 0x1, 0x0, 0x5, 0x2, 0x2, 0x5c8, 0x3f, 0x92, 0x5, 0xd7b, 0xeb, 0x61, 0x1, 0x100000000, 0x6, 0x9, 0x8, 0x2, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x6, 0xff, 0x81, 0x2, 0x8000, 0x2, 0x100, 0x9, 0xfffffffffffffffc, 0x0, 0x6, 0xfffffffffffffffa, 0x5, 0x8, 0x665, 0x3, 0x26, 0x3, 0x1], {0x0, 0x989680}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x1, 0x0, &(0x7f0000000040)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x20000000007}, 0x28) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000080)={0x0, 0x3, 0x3f, {}, 0x1ff, 0x3a1}) 16:39:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x3f00}, 0x28) 16:39:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xa0008000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000008000703000000feffffe8ee5ce08602327eccb7c77a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000092000000b700000000000000950000000000004e628fb5a4e4fffeffff9d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x565, 0x80100) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f0000000140)="f0d407b4414f400db028f3b8c16d661207383b3c2c1046195b56791a100ed700ed"}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x42, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000000c0)={0x80000001, 0x1, 0xfffffffffffffffc, 0xffffffff, 0xb1}) syz_open_dev$radio(&(0x7f0000000440)='/dev/radio#\x00', 0x2, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000340)={0x0, 0x9}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000480)=@assoc_id=r3, &(0x7f00000004c0)=0x4) 16:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x800) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@int=0x38e, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 223.346504][T15011] Unknown ioctl 1075332576 16:39:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e8000c001009ffeb0800010000000100", 0x24) 16:39:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xa0020000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x4000}, 0x28) 16:39:24 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffff9b196808c85e97623d80e1432d483dffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df70"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002400)={r2, r0, 0x0, 0xa, &(0x7f00000000c0)='syzkaller\x00', r3}, 0x30) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/keycreate\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000002440)={0x0, @in={{0x2, 0x4e21, @empty}}, [0x1e, 0x2, 0x7, 0x0, 0xffff, 0x6b3f, 0x40, 0x95, 0x9, 0x4, 0x10001, 0x4, 0x7f, 0x3f, 0x6]}, &(0x7f0000002540)=0x100) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000025c0)=0x1400000000000) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000002580)={r5, 0x6, 0x10}, 0xc) ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f0000000380)={0x0, 0x0, 0x2080}) 16:39:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000000c0)=0x8f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e8000f001009ffeb0800010000000100", 0x24) 16:39:24 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80010001009ffeb0800010000000100", 0x24) 16:39:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xfeffffff, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0xbf, "724f45cbdb225ebbc0c7849ecb5386ad6603d02371791144321c93bd2606ce4268a1aa6bcae9513fc4e930f3722ce09c4ecbf7f75eb483d8ff73f4f534d69767c3cd7af117bf0f5dd610e3ae92e96b34f4b8f5b4647d2ccdb8d5bfe8c6205631e8006ff2a362ab693c70935c4560e0a0d333ac7e67b94548d8a3a54580582a815c4d2a062888f939f4f3a6edd6166e4199d30ce4d6bd58ccaa299cecfb71804b2f172344811d0b2a4cb905d54e628c85699042982d52645d8c46a51d50cc6e02b84470b14009e4d767ca9eec90d20d1a6a97157d876ec4dfbbce3b3016c1439108059e0e1905513ebf5b6f"}, &(0x7f00000000c0)=0xf3) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x6}, 0x14) 16:39:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x6000}, 0x28) 16:39:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @broadcast, @remote}, &(0x7f0000000300)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x2, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x2, 0xb, 0xb24b19a432c1d215, 0x4, 0xfffffffffffffffc, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x8, 0x283b58e0bcfdd139, 0x0, 0xfffffffffffffff0, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x8df, 0x1000, &(0x7f0000000500)=""/4096, 0x41f00, 0x6, [], r0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000001500)={0x2, 0xd, 0x101, 0x3ff}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703007f00feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b71f0000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecca3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc998a6ead4e9d4cc8daeab2820120bec90dd32b19c7ef96af947673c358190c7225dd578fd424cd95e7cc74d95c19493ee2003413ddaa5ed634a9061a5e0cb6c5d948d7739eda63555c369c8f177cb2da745587ca493787b380518e2e892dee7d56ef97583b788d3c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x100, 0x0) accept4(r0, 0x0, &(0x7f00000004c0), 0x800) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000380)={0xa, 0x6, 0xcff, 0x0, '\x00', 0x6}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10000, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r3, 0xc0485630, &(0x7f00000000c0)={0xfffffffffffff6fd, "890bdb2730814e9e4d8df3f2751a6e636087d0bcc136cdc78b63ccd569d37ea7", 0x3, 0x1c0a, 0x5, 0x1000, 0x8}) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000003c0)=""/92, &(0x7f0000000440)=0x5c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffa888, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80060001009ffeb0800010000000100", 0x24) 16:39:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8100}, 0x28) 16:39:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x80) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000003c0)={r3, 0xffffffff}, &(0x7f0000000400)=0x8) getgid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x0, 0x37, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x7}, 0x28) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000440)={r4, 0x5}, &(0x7f0000000480)=0x8) chroot(&(0x7f00000004c0)='./file0\x00') 16:39:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b7eaffffff000000578d9a454ef3f3d84458692701b2c26decd9000000007083b7d02d05bbe267cba8ce8f00000703000000feffff7a0af0fff8ffffff79a4f0ff41000000b7060000ffffffff3d6405000000000065040400010000040000000001000000b7050000000000006a0a00fe000000008500220012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6ad36aff"], &(0x7f0000000340)='srf\x9a\x92\xc1P\xb3u?', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800e8001009ffeb0800010000000100", 0x24) 16:39:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff157aa4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b0346c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d2e3396f6cb74fb99c94905e9ff4a02196a1e9b7b92bf21dbcc921315ecd4aec376b3c6f4b6c4bed30af5150ed3574abc0f2d18d0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x4) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@ax25={{0x3, @default}, [@netrom, @rose, @null, @default, @default, @rose, @netrom, @rose]}, &(0x7f0000000040)=0x80, 0x800) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000280)=0x4) 16:39:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xfffffffe, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getgid() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000031009ffeb0800010000000100", 0x24) 16:39:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x88a8}, 0x28) 16:39:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001880)='/dev/audio\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001900)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000018c0)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000001940)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) pwritev(r0, &(0x7f00000017c0)=[{&(0x7f0000000380)="2ffb0ceda1c330d48097701b1a0476601c18cd63483ce9f570627a8ff3794a6e9c81f5bd531c99c2e3e7cd26c5916750718598394c494e31db341d777ed0390c8ed39ed2178f71f498843431124d44d6b115639f86e3239e81debbf1d746b86b6e3c9948cbf09ef4ff28ce9fe346ee691fc01633d19a21aae733d58ae5bd4cb1189feb244898423e9ece12f22826a4d24c8992ed6aa5e483c08d73d2de907b525e6fb2c7cc56829f794299d8aea32b6e0e20b7b592899abb67d72f2770d1a53793747a8cf00c7fa84564f07825543d5ef4dbcb5245", 0xd5}, {&(0x7f0000000480)="9e82a31e6ff13f7ea63ff2db1f70a7cddd48f6f0efbb9b94b746d6f1ab4c54dc2307c89bccd68bcc26d31775c2528eb07acf6b222f23485f54d6327f3b17a04ab8ceb23d93f164f238412185a5661b6af4adf5e01df230ddf0d68c94fe0dbb81677891737010e6d21e0573bae8018f6f8060220f3ca1ade7479ad7435b2ed0739d0bbda24ec187cf2c17fc8ffcc1db749a3e184c1fce40faff8ad9b5fd71ed65bfdc26e03a025b105b2b3ea890493f08c415d0e82709e782da47d3821a140c3ed8681717dc2871a6ebb6a82e69fd65055f8d206889a34f4e5d5384c09b23a13fafa75a69361fe5fe2feffbbc8053d1a25c7bed1bfb1f951ceb", 0xf9}, {&(0x7f0000000040)="fe", 0x1}, {&(0x7f00000000c0)="28320150ced125f9c3f83262e234a58c11c1110b3d621fa73fdbebe600239fef1d001395669d8afe54558a7b73573c820e00f55f4cd9be71648cb9cd0f45e38f358d7669a4a1e292675b3f73052a4e58809d47a4139d2126b8c3ee0b6b570367d54b36a0145f0b5e2ad6a7b1b859e124fd7551748922c857880cf60a8762ae98503ec36fedc776dce2548879078b03510b0d26d7a6c422a3e8fa7a45cbe5b74bd614ce0bc56a3cdd7bf4472dd29634d0", 0xb0}, {&(0x7f0000000280)="eb72a1", 0x3}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="7ed660339281aeb214c804a23951fcd9efd416f8945b62363041a6485eabd0a17d35f19f7066909df3aac5d3720d8bc085f44bcc10ffaa98adced8d92d9ff511dc412191d43140023d6782a0daadd0dca8a0c2a7a369187e8a2cda19f8274d1b53f315ded402fd2095d5c13cd09b0c0a10361a7bfc42e26b86b1cd20a8aaf6e5cfd72a5745d908467b743bfbd034dac9d8b14208030ffb261512784e31e41b6fa6d6df6ce95820880e68cdf741d0dc51748a3d82ba7203a645f3e3db7e", 0xbd}, {&(0x7f0000001640)="5636cc5bb9a3350b96259d7a73ab9925dacc6f92e4a10d6e6de21731370c0dc741ca97c1dbabc384def3fb5c78149a00c91a15bafacd748660b559ecda5017969c95af12c6110efcd7b593b45a6ec0d859feda9f90a3ab5cdbdfda2397c6264cf5cf899f9f113b17555fe7c2aa3bff6e9fc5e211c6ebc57eab76fae71e31bce97e555a51eee182972fc96a9e3912c60a7d817ad4aa41ea6e31b0fec571", 0x9d}, {&(0x7f00000002c0)="69cb395aa710a773b34f0659b15e7164671bf4b0cd0eb4a90bbc96e4ab006d80228f98035d28ea977a9e4c364c9a2ef561f904b536c6d87935556f4c0a5c23428a7662e4642705768bceeeb4dcfc48ca939bf29bb69714cbdc1aa9c1c8", 0x5d}, {&(0x7f0000001700)="aafd935babfd888ee4c4448ad16e7d5e83d1d1c928eca9ea170b859caa15651757398adf7d146e758c2238cf063891d98f7f5e10b5971cf516dbc5fba49185360203ab438acaf1a3ea23c58d5a9e5175e336275f90c370dc4da26015cdc2f910c183f922803f828dda7d9aa2e8dbde94e9e422dc00f20c4060b13a98e97c0ecbe63241b5ef3f3949", 0x88}], 0xa, 0x0) 16:39:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x2a0ffffffff, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000051009ffeb0800010000000100", 0x24) 16:39:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffffff03000000000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x0, 0x0) accept$nfc_llcp(r1, &(0x7f0000000440), &(0x7f00000004c0)=0x60) r2 = accept(0xffffffffffffffff, &(0x7f0000000100)=@tipc, &(0x7f0000000380)=0x80) r3 = fcntl$getown(r2, 0x9) ptrace$getsig(0x4202, r3, 0x7ff, &(0x7f0000000500)) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000003c0)={0xee, 0xfff}, 0x2) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r4, 0x4c00, r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000480), &(0x7f0000000500)=0x60, 0x800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000440)={r1, &(0x7f0000000380)=""/174}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000540)={0x31, 0x4, 0x0, {0x2, 0x9, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000580)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 16:39:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400000, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8e03}, 0x28) 16:39:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8000a0ffffffff, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x28, r2, 0x2, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", ""]}, 0x28}}, 0x80) mknod(&(0x7f0000000400)='./file0\x00', 0x20, 0x8) 16:39:25 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000061009ffeb0800010000000100", 0x24) 16:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000ecff00006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x1f, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x404000, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x5}) 16:39:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800000a1009ffeb0800010000000100", 0x24) 16:39:26 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000001240746d0000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1356e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xc, 0x4000010, r0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x100000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xa888}, 0x28) 16:39:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800000c1009ffeb0800010000000100", 0x24) 16:39:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000002feffff7a0af0fff8ffffff7910309b6decb2c1be3643c2602cefa4f08000000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000085000000120000ebb70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d54325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f00000000c0)=[0xbe, 0x6]) 16:39:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000c4e726ad1307b50000000000703000000fe000800b7060000ffffffff3d6405000000000065040400010000000404000001000000d43759bfc478909e8e690e40b1000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a30c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc89a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000380)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f00000000c0)) 16:39:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x200000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800000f1009ffeb0800010000000100", 0x24) 16:39:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8000a0}, 0x28) 16:39:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xfffffffffffffecf, 0x800) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x44e7fb30d35b324a, 0x1, [0x8, 0x400, 0xfff, 0xfffffffffffffff8, 0x100, 0x3, 0x8, 0x100]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) 16:39:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000000c0)=0xb3) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000440)={@dev, @broadcast, 0x0}, &(0x7f0000000480)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x10, 0x7, &(0x7f0000000100)=@raw=[@map={0x18, 0x5, 0x1, 0x0, r1}, @jmp={0x5, 0x4, 0x8, 0xa, 0x2, 0x0, 0x8}, @generic={0x4, 0xfffffffffffffff8, 0xfffffffffffff031, 0x10001, 0x80000001}, @exit, @exit, @ldst={0x0, 0x1, 0x1, 0x2, 0x9, 0x0, 0x10}], &(0x7f0000000140)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x2, [], r2, 0x6, r1, 0x8, &(0x7f00000004c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x7, 0x1, 0x8}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x3f00000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800003f1009ffeb0800010000000100", 0x24) 16:39:26 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0xe, 0x0, &(0x7f0000000580)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x74, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x80000000, @mcast1, 0x5}, @in6={0xa, 0x4e21, 0x9, @empty, 0x7f}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x80000001, @local, 0x6}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000380)={r2, @in={{0x2, 0x4e20, @multicast2}}}, 0x84) read$alg(0xffffffffffffffff, &(0x7f0000000440)=""/250, 0xfa) 16:39:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x1000000}, 0x28) 16:39:26 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000401009ffeb0800010000000100", 0x24) 16:39:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x1a7, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8d9}, 0x11) 16:39:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000febfff7a0af0fef8ffffff79fd39a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b70500000004000000000000000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747774a0a3e9bfd1586e13cdf58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000000c0)={[0x5000, 0xd004, 0x1, 0x116004], 0x3, 0x20, 0x7}) 16:39:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x4000000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80088471009ffeb0800010000000100", 0x24) 16:39:27 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x9}, 0x28, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x430000, 0x0) ioctl$sock_bt_hci(r1, 0x400448dd, &(0x7f00000000c0)="1c5f4eb96de8f170ae6e6316c5c70b5907e9b34005aa815d7b96e418a90430c6d71294") perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000300)=0x7) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000280)) getgid() epoll_create1(0x80000) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000002c0)=""/12) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80088481009ffeb0800010000000100", 0x24) 16:39:27 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000700)='/dev/audio\x00', 0x1, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000740)={0x1, 0x61}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x350, r3, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x480000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_BEARER={0x144, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7597}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ifb0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x44d8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xeec4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @loopback}, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1ff, @mcast2, 0x8}}}}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa901}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2c8b8a38}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x55}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x93}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2e1}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x428b489}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x350}, 0x1, 0x0, 0x0, 0x8000}, 0x1) 16:39:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2000000}, 0x28) 16:39:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x6000000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xa70, 0x8054, 0x583, 0x7, 0x0, 0x1c0000, 0x8001, 0xc, 0xfff, 0xbd, 0xd3d1, 0x8, 0x2, 0x4b6, 0x1, 0xffffffffffffc2b3, 0x7, 0x8, 0xfffffffffffff56e, 0xfffffffffffffff9, 0x7, 0x0, 0x1f, 0xffff, 0x7f, 0x0, 0xc34, 0x8, 0xc24, 0x1f, 0x8, 0x61fc, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0xe1}, 0x800, 0x76, 0x2f80000000000000, 0x6, 0x3, 0x4, 0x8}, 0x0, 0xd, r0, 0xb) 16:39:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80065581009ffeb0800010000000100", 0x24) 16:39:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/autofs\x00', 0x41, 0x0) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000006c0)='9p\x00', 0x208000, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend='noextend'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@access_user='access=user'}], [{@appraise='appraise'}]}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0xfffffffffffffffa, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x2, 0x9292, 0x4}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0)={r5, 0x100000001, 0x1}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x6, 0x0, &(0x7f0000000080)="06000000f14c", 0x0, 0x8dc}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x0, 0xb7, 0xe3, &(0x7f0000000500)="8fe49cd0c37f694b784095c82614f66ffd646076581ec785143fd2bbb670dae38d509b4fbf313a18c9193b36d59daa96d1eba7de8f08abd935e70dc20c7c25a75b6eb5856d817e45bf11401db9f48484ca087b9fe8b6306fd3bf6e31c043f00aeb26e479b90e7895e4e17fb334854d646d8df499c61c9c53995102035c876752e1406a068a0bf22dee4e5e002673b31f5db3d2e963c386820e30b25e2a1b017aa487cfbab4973893d00dceb4d7250a91aefe9d6c694fcd", &(0x7f00000005c0)=""/227, 0x5}, 0x28) r6 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x56b95119268dfff1) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000880)) setsockopt$inet6_int(r6, 0x29, 0x8, &(0x7f00000000c0)=0x200, 0x4) 16:39:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x3f000000}, 0x28) 16:39:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x1, &(0x7f0000000280)=ANY=[@ANYRES64=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 16:39:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8100000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000601009ffeb0800010000000100", 0x24) 16:39:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffffffffffff1b, &(0x7f0000000040)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x40000000}, 0x28) 16:39:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() io_setup(0x6, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) io_pgetevents(r0, 0x2, 0x7, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000240)={r1, r2+10000000}, &(0x7f0000000640)={&(0x7f0000000600)={0x652}, 0x8}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0x9, 0xe5, &(0x7f00000000c0)="d90e05f80a5c6c0278", &(0x7f0000000400)=""/229, 0xb5d4}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0xfffffffffffffffe}, 0x1d7, 0x10, &(0x7f0000000000)={0x0, 0x8000}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:27 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000150065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x81, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xd3, 0x0, &(0x7f0000000040)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x2}, 0x28) 16:39:27 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80058651009ffeb0800010000000100", 0x24) 16:39:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x88a8ffff00000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:28 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000811009ffeb0800010000000100", 0x24) 16:39:28 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000040000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f8ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc00a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x800}}, 0x9, 0x4}, &(0x7f0000000580)=0x90) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000005c0)={r4, 0x23, 0xffffffffffffffff}, 0x8) ioctl$SIOCX25GDTEFACILITIES(r2, 0x89ea, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) setsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f00000003c0)="27163894bd848d23967d353e0b67824a81ece72fbad8c90f1303734ef65bcb132fca4a35d52a90675398ea6b64fe2521da565639da786dc19a9655797b3a9d4906782f5d0d2b3238067bc5d07292709871f4505c31921cab88332a4bf96ba9e354d625e20aaad1e46a96907c476492d2549e3a637d7de3882aab35b38a59e9a5e3", 0x81) write$cgroup_subtree(r3, &(0x7f0000000480)={[{0x2b, 'pids'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2d, 'pids'}]}, 0x16) ioctl$void(r0, 0x5451) 16:39:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x60000000}, 0x28) 16:39:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x8e03000000000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:28 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80047881009ffeb0800010000000100", 0x24) 16:39:28 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000002a6a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) fremovexattr(r0, &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d6c90f67fb01e211253457d47cfbc1c3406e99176ec22b112c0feec937dd01d3fc468893d9ac2ac4bf72dcf78fbf199480600713aacc0975f6d1f1ab6c36e5a8865df935b7f94e926a81ef8c982d48d5d7b14be8bfac6ea54d37c3cd02a36bacd063534d751c3f8545d70ff0f3537814ef84966a8c7b9e6500528eb4e6b2179025dee39abd016b91a27fde3fb74fcfe07a97f0d26ed89bbb1c3c5b85db1a04e5ed9089005b5b0bbb96136960a62ace0f197b064e404d8cef1058f902196751615a7c8fe6caff32d38fc255f47a0ecce4c9fd7036e9937fd760b396401663d2f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r4 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x6c0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x1c, r5, 0x400, 0x70bd2a, 0x8, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) 16:39:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x81000000}, 0x28) 16:39:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b706000081f6f8ffffff3aff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000280), &(0x7f00000002c0)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405ff0100000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f69e4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e902d1586e13cd098b12dc0de1d4376a46c611c2e2d56325292c28cc9dfae111705edf2f55efabd14fdc"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xfeffffff00000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:28 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80048881009ffeb0800010000000100", 0x24) 16:39:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x88a80000}, 0x28) 16:39:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff30}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f00000000c0)={0x72, 0x47eceffa, 0x1}) 16:39:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getgid() flistxattr(r0, &(0x7f0000000b00)=""/4096, 0x1000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7020000a30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4ac9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) r7 = geteuid() getresuid(&(0x7f0000000440)=0x0, &(0x7f0000000a80), &(0x7f0000000ac0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000640)={0x3e8, 0xfffffffffffffff5, 0x4, [{{0x0, 0x2, 0x6c1a, 0xffffffffffff2f7c, 0x10000000, 0x4, {0x0, 0x8000, 0x5, 0xa34, 0xff, 0x1, 0xffffffff, 0x6, 0x2, 0xfac, 0x7, r4, r1, 0x7f, 0x10001}}, {0x0, 0x1, 0x4, 0x6, 'eth0'}}, {{0x6, 0x0, 0x1, 0x8001, 0x1, 0x80000000, {0x2, 0x1, 0x0, 0x1, 0x9, 0x10001, 0x9, 0x101, 0x7, 0x3, 0x10001, r5, r1, 0x6, 0x6}}, {0x0, 0x0, 0xa, 0x2, 'syzkaller\x00'}}, {{0x1, 0x2, 0x4, 0x1, 0x5f9, 0x19, {0x0, 0x3, 0x8, 0x8, 0x1000, 0x8001, 0x1, 0x7ff, 0xfff, 0x1ff, 0x5, r6, r1, 0x0, 0x200}}, {0x6, 0x7fff}}, {{0x1, 0x0, 0x9, 0xffffffffffffffe1, 0x6, 0x6, {0x6, 0xd5, 0x1000, 0x7, 0x3ff, 0x4080000000000, 0x93b2, 0x3f, 0x100000001, 0x9, 0x7f, r7, r1, 0x7, 0x1}}, {0x2, 0x4f58, 0xa, 0x1, 'syzkaller\x00'}}, {{0x5, 0x3, 0x3, 0x65, 0x100, 0xfffffffffffffffa, {0x0, 0x6, 0xffff, 0x6, 0xcf, 0x5, 0x5, 0x1ff, 0x1, 0x7d6c, 0x0, r8, r1, 0x4, 0x9}}, {0x0, 0x4, 0xa, 0x2, 'syzkaller\x00'}}, {{0x2, 0x2, 0x5, 0x9, 0x9, 0x4, {0x5, 0xde3b, 0x8, 0xa303, 0x4, 0x6, 0x5c646c3d, 0x7f, 0x40, 0x8, 0x200, r9, r1, 0x3, 0xcbe4}}, {0x6, 0x2, 0xa, 0x2, '#/\x96md5sum)'}}]}, 0x3e8) [ 227.809376][T15388] Unknown ioctl 1074819273 16:39:28 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000e81009ffeb0800010000000100", 0x24) 16:39:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4001) 16:39:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffffff00000000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x88a8ffff}, 0x28) 16:39:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000000709ffeb0800010000000100", 0x24) 16:39:29 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x35, 0xc00) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff0300003e6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46a9c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0xfffffef6) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x1f) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x1) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380), 0x4) 16:39:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) accept4(0xffffffffffffffff, &(0x7f0000003e40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000003ec0)=0x80, 0x80000) getresuid(&(0x7f0000003f00)=0x0, &(0x7f0000003f40), &(0x7f0000003f80)) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000003fc0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) 16:39:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffffffa0008000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8e030000}, 0x28) 16:39:29 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$void(r0, 0x5451) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x2003) fstat(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x35510de9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000380)="c3128e5a948f2b9ace45a68b5c14ac3ef7f59f38fb041ce7a211161269644c5e4dcd479cffb03be4383854214df01d2366661adfdcf627d2e8f42a105c369358b38f3bae07ad40eec4e0e1d61f0bc521252cc05744aee7921ba8d750c624e5", 0x5f, 0x5}], 0x10000, &(0x7f0000000640)={[{@block={'block', 0x3d, 0x800}}, {@map_off='map=off'}, {@uid={'uid', 0x3d, r3}}, {@check_relaxed='check=relaxed'}, {@cruft='cruft'}, {@gid={'gid', 0x3d, r4}}, {@session={'session', 0x3d, 0x14}}], [{@euid_lt={'euid<', r5}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/input/mouse#\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}, {@hash='hash'}]}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='\x00') 16:39:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000000a09ffeb0800010000000100", 0x24) 16:39:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000021009ffeb0800010000000100", 0x24) 16:39:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffffffa0020000, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xa0008000}, 0x28) 16:39:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bffeffff7a0af0ff00000000b7060000ffffffff3d64050000f3ffff64060400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47fbb746d2e81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d00"/175], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000006c0)={0x7}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) getsockname$packet(r2, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff, 0x83, 0x8}, 0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0}, &(0x7f00000004c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB=',\t\x00\x00', @ANYRES32=r3, @ANYBLOB="00000039d40000000000640ac84c0000fa41ab8000080000d5900c0010000000ff0f08000400000018000000ffffff7f0000000000010000000000000000000085000000300000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x3, 0x7f, &(0x7f0000000400)=""/127, 0x41100, 0x1, [], r4, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xa, 0x1, 0x1}, 0x10}, 0x70) sendto$x25(r0, &(0x7f0000000380)="7b7196c8cdc63e3b8860cc19568da69a16996f84a198", 0x16, 0x80, &(0x7f00000003c0)={0x9, @remote={[], 0x0}}, 0x12) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8100, 0x0) connect$rose(r5, &(0x7f00000000c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 16:39:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) fchownat(r2, &(0x7f00000000c0)='./file0\x00', r3, r0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000031009ffeb0800010000000100", 0x24) 16:39:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48ef054c", 0x0, 0x8dc}, 0x28) 16:39:29 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000041009ffeb0800010000000100", 0x24) 16:39:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfeffffff}, 0x28) 16:39:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() io_setup(0x7, &(0x7f0000000040)=0x0) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4000) bind$llc(r2, &(0x7f0000002900)={0x1a, 0x110, 0x9, 0x40, 0xffff, 0x1, @remote}, 0x10) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x200, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = creat(&(0x7f0000001640)='./file0\x00', 0x60) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/vcs\x00', 0x200400, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000002840)='/dev/dsp\x00', 0x101000, 0x0) io_submit(r1, 0x7, &(0x7f00000028c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x2a614efc, r0, &(0x7f00000000c0)="10c4cbfa7f0ee5ad2e125461e11d5c8fb1723422ca00a0a3c0655e3052257814f0e5a3570f32c544d14416064d", 0x2d, 0xffffffffffffffe0, 0x0, 0x3, r2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xf, 0x8e6, r0, &(0x7f0000000380)="0f499f30d86b677e8d2e9b82e1d0ce6ec5d478727ce32df095a8c55420d87a88df63fb6fc58d5c03bed84ad8d5fc171ef51df540bca5b75a7e87cc603039939efb0cab4a40fdd5ce78a9648d1b1fb57631b8e6c4d243483042256f2adb9c71e8f822c14445a6daa23b6b291bfa2254049faa4949118fad35a5e4cb", 0x7b, 0x9, 0x0, 0x3, r3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2c10ad48ece2f3a6, 0x68de, r0, &(0x7f0000000480)="3d7792d792bcdf73e3eccc568f79f9c075315b6aef02354235da9b830f98d6d1288c26ced996fcacc5fa418dd927ff27febe5b92974bdbc289be65c30df4f7b0b3f0bdeee237d727982494bf69b68b56e2ce156f209d3c6d92bc21f966cfa5ecd1d2aa6e09ada995b7a83acd534a50037a0d9cd0a4f45fe202864d06f1782199b28b08181a44a042ca", 0x89, 0xffffffffffffffbf, 0x0, 0x1, r4}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f00000005c0)="f677cf275cd8c5a0cda36fe41119e82eb3ee2a915aab0929526f095d414ba22fbf3a92839d71cf3e276223cba2cc", 0x2e, 0x5, 0x0, 0x3}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x7ff, r0, &(0x7f0000000640)="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", 0x1000, 0x9, 0x0, 0x2, r5}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f00000016c0)="75035d710d7acb8be0e0e82fab66215e9be55ed6e08389c11af13216e7e3bf3085a726d0fa875f37f57fb957f31212cb15d718c588052ae6afc6f41f97b59bd61b8215956ec02f69d1e1be8547cb382b0ce43aa5c1f6c1181c77f44dfd2903ecc5b57b0d1087b72aa358c2a86ce5c9b626d98b864292bc1e5fc8ce8ae5cd64bdc6021aa95a1ac596bfbd3bbf1fa3589dbdae49b50695436383fec2297f3bb1dd25f481626fcd634b275327aa4762577e987dad6e47ca1b98a726abdb9c4817d0070bc7a4f36e6bad0c5466dfca", 0xcd, 0x2, 0x0, 0x1, r6}, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f0000001840)="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", 0x1000, 0x4, 0x0, 0x0, r7}]) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x2000000000000213, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af00000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x7}, 0x48) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r8, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000051009ffeb0800010000000100", 0x24) 16:39:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10001, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f00000000c0)=0xf4240) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x2, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40002) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2}, 0x28) 16:39:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xffffa888}, 0x28) 16:39:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000061009ffeb0800010000000100", 0x24) 16:39:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = socket(0x2, 0x3, 0x8000000000000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x3b8, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 16:39:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001fe000000008500000012000000d669c6bbcc5a0000000000000095000000000000004e628fb5a4e47f6ce4c59da2dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d00"/188], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) 16:39:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800000a1009ffeb0800010000000100", 0x24) 16:39:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x60}, 0x28) 16:39:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfffffffe}, 0x28) 16:39:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800000c1009ffeb0800010000000100", 0x24) 16:39:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2a0}, 0x28) 16:39:30 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0ade12c7f19b54cd1ef9780123f12124f0fff8ffffff79a4f0ff00000000b7060000ffffffff3d64250000000000652dfd24780000000404000001000000b7050000000000006a0ac700fe000000008540000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c325274fe64a0a3e9bfd1586e13cde57a568b6a46c611c2e2d56325292c28cc9dfa16b390d8df2f55efabd14fdc99a86ead4e9d09cbee"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @remote}, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) syncfs(r1) 16:39:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@mangle={'mangle\x00', 0x1f, 0x6, 0x808, 0x0, 0x2a0, 0x2a0, 0x4f0, 0x5f8, 0x738, 0x738, 0x738, 0x738, 0x738, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x2, 0x8, 0x2b10, 0x2, 0x1}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, [], 0x22}, @ipv4=@multicast1, 0x2b, 0x2b, 0x100000000}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x20}, @empty, [0x0, 0xffffffff, 0xffffffff, 0xff000000], [0xff000000, 0xff, 0xffffff00, 0xff], 'team0\x00', 'nr0\x00', {0xff}, {0x4bdd964009ceb1}, 0x2, 0x8, 0x3d09eeb48b8177b7}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x20, 0x401}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x10000, 0x0, 0x1}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@broadcast, 0x30, 0x6, 0x4}}}, {{@uncond, 0x0, 0x228, 0x250, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x0, 0x2, 0x100000000000, 0xfffffffffffff000, 0x20, 0x1, [@local, @mcast1, @ipv4={[], [], @rand_addr=0x2}, @remote, @mcast1, @mcast2, @rand_addr="b77c1514af47c1387b3cfca3e0a92784", @mcast1, @empty, @mcast2, @dev={0xfe, 0x80, [], 0x2a}, @local, @ipv4={[], [], @rand_addr=0x4}, @ipv4={[], [], @broadcast}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}], 0x6}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0xa}}}, {{@uncond, 0x0, 0xc8, 0x108}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x6, 0x80, @ipv4=@local, 0x4e24}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @empty}, [0xff000000, 0xffffff00, 0xffffff00, 0xffffffff], [0xffffffff, 0xffffff00, 0xff, 0xff], 'dummy0\x00', 'veth1_to_bond\x00', {0x67fabd2e6d238fa5}, {0xff}, 0x73, 0x40, 0x7, 0x40}, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x76828a35}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x868) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e800000f1009ffeb0800010000000100", 0x24) 16:39:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8000a0ffffffff}, 0x28) 16:39:30 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000040)={0x6, 0xfffffffffffff800, @name="02bd3328659b87e9e43e154eb7fc04a849c318cc49881f269e7f2bba902c30f8"}) 16:39:30 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000101009ffeb0800010000000100", 0x24) 16:39:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x38e}, 0x28) 16:39:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() recvmmsg(0xffffffffffffffff, &(0x7f0000003dc0)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000780)=[{&(0x7f0000000280)=""/190, 0xbe}, {&(0x7f0000000340)=""/232, 0xe8}, {&(0x7f0000000440)=""/114, 0x72}, {&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000580)=""/200, 0xc8}, {&(0x7f0000000680)=""/254, 0xfe}], 0x6, &(0x7f0000000140)=""/15, 0xf}, 0x6}, {{&(0x7f0000000800)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000880)=""/84, 0x54}, {&(0x7f0000000900)=""/177, 0xb1}, {&(0x7f00000009c0)=""/140, 0x8c}, {&(0x7f0000000a80)=""/204, 0xcc}, {&(0x7f0000000b80)=""/237, 0xed}, {&(0x7f0000000c80)=""/23, 0x17}], 0x6, &(0x7f0000000d40)=""/18, 0x12}, 0x8}, {{&(0x7f0000000d80)=@rc, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)=""/151, 0x97}], 0x1, &(0x7f0000000f00)=""/211, 0xd3}, 0x800}, {{&(0x7f0000001000)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002240)=[{&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/162, 0xa2}, {&(0x7f0000002140)=""/191, 0xbf}, {&(0x7f0000002200)=""/35, 0x23}], 0x4, &(0x7f0000002280)=""/112, 0x70}, 0x4}, {{&(0x7f0000002300)=@isdn, 0x80, &(0x7f0000002880)=[{&(0x7f0000002380)=""/246, 0xf6}, {&(0x7f0000002480)=""/143, 0x8f}, {&(0x7f0000002540)=""/143, 0x8f}, {&(0x7f0000002600)=""/141, 0x8d}, {&(0x7f00000026c0)=""/102, 0x66}, {&(0x7f0000002740)=""/218, 0xda}, {&(0x7f0000002840)=""/35, 0x23}], 0x7}, 0x3}, {{&(0x7f0000002900)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002980)=""/54, 0x36}, {&(0x7f00000029c0)=""/188, 0xbc}], 0x2, &(0x7f0000002ac0)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000003ac0)=@pptp, 0x80, &(0x7f0000003b40), 0x0, &(0x7f0000003b80)=""/220, 0xdc}, 0x2}, {{0x0, 0x0, &(0x7f0000003d40)=[{&(0x7f0000003c80)=""/113, 0x71}, {&(0x7f0000003d00)}], 0x2, &(0x7f0000003d80)=""/24, 0x18}, 0x6}], 0x8, 0x2, &(0x7f0000003fc0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004140)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000004240)=0xe8) recvfrom$packet(r0, &(0x7f0000004000)=""/102, 0x66, 0x20, &(0x7f0000004280)={0x11, 0x1a, r1, 0x1, 0x5df132ca, 0x6, @remote}, 0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000001e65040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:31 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff9bebfa00000000b7060000ffffffff3d6405000000000065040400010000000404000001050000b7050000000000006a0a00fe000000008500000012000000b700000000000000950000000000bc8aa6f9a45d1bd900004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13bee58b6a44c611c2e2d56325192c28cc9dfa39df705edf2f55efabd14fdc99a86e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000480)='!/\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0xd8d, 0x6, 0x1, 0x4, 0x0, 0x401, 0x800, 0x5, 0x81, 0x3, 0x2f9, 0x1, 0x9, 0x5, 0x0, 0x7, 0x9, 0x35b9d1c4, 0x66, 0x3f, 0x55e9, 0x401, 0x6, 0x79, 0x8, 0x8001, 0x0, 0x10001, 0x9, 0x200, 0x0, 0x5, 0x0, 0x4, 0x4, 0x80, 0x0, 0x7, 0x4, @perf_config_ext={0x565, 0x4}, 0x800, 0x7fffffff, 0x5, 0x9, 0xfffffffffffffffc, 0x28, 0x7}, r2, 0x9, 0xffffffffffffffff, 0x8) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000601009ffeb0800010000000100", 0x24) 16:39:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x100000000000000}, 0x28) 16:39:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x3f00}, 0x28) 16:39:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000ff0000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x100000001}, &(0x7f0000000100)=0x8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000003c0)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x3}, &(0x7f0000000380)=0x8) 16:39:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x2000000, 0x100, 0x0, 0x1ff, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3949, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) times(&(0x7f0000000040)) r1 = getgid() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x2, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000740)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000880)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000ac0)={{}, {0x1, 0x6}, [{0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x6, r5}, {0x2, 0x83b68c0050f1c501, r6}, {0x2, 0x7, r7}, {0x2, 0x4, r8}, {0x2, 0x4, r9}, {0x2, 0x5, r10}], {0x4, 0x1}, [{0x8, 0x1, r1}, {0x8, 0x3, r1}, {0x8, 0x2, r1}, {0x8, 0x7, r1}, {0x8, 0x2, r1}, {0x8, 0x4, r1}, {0x8, 0x0, r1}], {0x10, 0x2}, {0x20, 0x1e80dc71f6ad1d1a}}, 0x9c, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 16:39:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() socketpair(0x1f, 0xa, 0xffffffffffffffb5, &(0x7f0000000840)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000880)=0x2, 0xfffffffffffffff5) fcntl$getflags(r0, 0x401) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x22000, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000800)={0x7, 0xe382}) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f00000000c0)={0x0, 0x9d, 0x5, 0x28, &(0x7f0000ffb000/0x4000)=nil, 0x9}) sendmsg$inet6(r1, &(0x7f00000007c0)={&(0x7f0000000100)={0xa, 0x4e22, 0xfffffffffffffff8, @remote, 0x1}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000380)="bc37281dbd50e66faffd61fdf06b2cc00983d3e12533dbe3fd6ac9b8702ea772d26e5ee19b2ce463e14259841463d6e83fe408f495f8ae08e98b6a976202ebcff99da61f588d6f7ddfdc620698a8aea1a6300efb04163174adda0908", 0x5c}, {&(0x7f0000000400)="5940cb68e7dea6d47e95e428e396014ff9938b42fd7ce88e562750bb25ec15301ed3b4a230c4a9673b1e847908ef868aec3ea59ab3e1c2c2939f295f41bd3237edd0119da3298b9fc7291fee46f84c1a0469977341f07b634e76d4d7428f303ca0ff1398e74668ba217cabfeba7d419bbd04ee683b5d346331c4131532722b83f03bf042c2cac77a8c71a934fadb9b", 0x8f}, {&(0x7f00000004c0)="b4f4b8c7b9370b2284316388135252831677697bd091ebc6fafe864700c23fe7af969d2d450f55a198994270add1ba35c14c311023d61bd00da0fc8db737c8cab9e9324a698062469267cf10ef4fa3f074d2d5faacdfeed8fb2b4dc42ff0f91cc0a3f0adf066decab2bda664834944fca5a3dd785130899d7683ab9d57607a5e647eaca14ede2a22eb29d0ae5747eecd8ac9be8c81411e6086dd092c534812f8978ec614381bb0b20a946e", 0xab}, {&(0x7f0000000580)="a2c1dedcdb9c9dff88182de162d568c9b4ece53f69c432f97c35ff36e6ca0320582adb8115a91439d86786a663e9817010c96811d50bd37e6088bca9e9f09c6047dfb6ac38dccdd3195ecdb30a8a1fdae77b3cc9bae83c96bebfdc2e356a8dab00c054e53647f280a2f31640646c707b355035c9cf78d46ef9ace472015ed6dfb431a0645a78", 0x86}, {&(0x7f0000000140)="7c567b378f", 0x5}, {&(0x7f0000000640)="e2fc06c22437383f0605f98e803a79feb03f5e54007b95d0f318b87f47789c55bf7b16b049a8875dd6a269147ab18cac3144de6141935f16db2cb0ad12914453c8d087c91054342ef4662ef3da45ca32e8bd461ad886b1bf6d7c6f3d33843f86d3d67e5fb73b892aa9ca1d3f0b172342af9eb6e65383b6fb8c14112c1611f12dd3d0d9e0f1ce11ad63", 0x89}], 0x6, &(0x7f0000000780)=[@flowinfo={{0x14, 0x29, 0xb, 0x2}}], 0x18}, 0x4080) 16:39:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000e81009ffeb0800010000000100", 0x24) 16:39:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x4000}, 0x28) 16:39:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x200000000000000}, 0x28) 16:39:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000004009ffeb0800010000000100", 0x24) 16:39:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfffffffe}, 0x28) 16:39:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001580)={&(0x7f0000000100)=@sco={0x1f, {0x24, 0x10001, 0x4, 0xd5c, 0x2ac3, 0x3}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001380)="ffb95db2f05be5372f8e0e3fc629694e772e2a397d95d6c9edcddb1cebdf9e815821bffa044818aa0283428b3bb33d9a6c2cfcf7818b595b4c89e92d62a752a133b7c4b31dac81bcaafbb4d57c355ec5705b68adcae7b7d5911c74a172f4716dd11c00578a126f0ccbda7ff0a720b4e8635185f01804521e2f3127a4175b7e170cdc78a9d06ac1c518622d92c7792d42db84c88a67a72b78f9b37159083801329862737841009ff192f6b5c7aee0357ab48ce92e09c613d17f2a476b8b3aa222a1f059fa5c960e97fab8ac61818397683261e406", 0xd4}, {&(0x7f0000001480)="d84d0cb727084a2bb3fcefb7d2454dba447818464fc4a566b00eb4b4030d1bbccb8ae9082a0e4c9681b5591aee388af570956bc87d951ad842b59322f91780785e785f54379d0c79b915b545f93e2e5621227057ffe034d09306692363712baf4be1367d3409ab9f9b08e9adfc9be4ee5699b7fa66ddfd84fe3121ab526657c8803f6b5466508b4aa42e4dd73f506b6fea28c422162a", 0x96}], 0x2}, 0x4000) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=""/4096) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) bind$isdn_base(r0, &(0x7f0000000040)={0x22, 0x66, 0x800, 0x100000001, 0x3}, 0x6) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={r1, r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xffffffffffffffed, 0xfffffffffffffff0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0xfffffffffffffee1) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000) 16:39:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x6000}, 0x28) 16:39:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x3f00000000000000}, 0x28) 16:39:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000000209ffeb0800010000000100", 0x24) 16:39:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfffffffe}, 0x28) [ 230.557203][T15663] QAT: Invalid ioctl [ 230.577400][T15663] QAT: Invalid ioctl 16:39:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x8000000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70200000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 230.602925][T15663] QAT: Invalid ioctl [ 230.615044][T15669] QAT: Invalid ioctl [ 230.638439][T15663] QAT: Invalid ioctl 16:39:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x4000000000000000}, 0x28) 16:39:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8100}, 0x28) 16:39:31 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000000709ffeb0800010000000100", 0x24) [ 230.668301][T15669] QAT: Invalid ioctl 16:39:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff000000000000000000008fb63d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc999b6ead4e9df513ca78a928f5915efd7e33f811dd7028d1faed6e8b095defb94ac0e07820e6c5f47ab6f3c088d2da"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) write$P9_RSYMLINK(r1, &(0x7f00000000c0)={0x14, 0x11, 0x1, {0x2, 0x1, 0x6}}, 0x14) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x2, 0x2, 0x8}, 0x80000000}}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x200000bc, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x70) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x1, 0x1a1001) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000080400003002000040010000400100004001000040010000380300003803000038030000380300003803000004000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"], 0x468) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x6000000000000000}, 0x28) 16:39:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfffffffe}, 0x28) 16:39:32 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000000a09ffeb0800010000000100", 0x24) 16:39:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8e03}, 0x28) 16:39:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) set_thread_area(&(0x7f0000000100)={0x8, 0x20000000, 0x1000, 0x0, 0x4, 0x7, 0x20, 0x6, 0x8, 0x4}) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f00000000c0)={0x1f, 0xfffffffffffffffb, 0x5, 0x202, 0x4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4001, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0xfff) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) 16:39:32 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0300010000000100", 0x24) 16:39:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2}, 0x28) 16:39:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x24b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x3, 0x5}) getgid() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6c0000010000000000bb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f57efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xfffffffffffffd5b, 0x0, &(0x7f0000000100)="52d38102000000ea64b8c9776fca403803f667625b0000000031439f90ea00"/44, 0x0, 0x8dc}, 0x354) r3 = dup(r2) renameat2(r3, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x2) ioctl$TCSBRK(r3, 0x5409, 0x5) 16:39:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8000a0}, 0x28) 16:39:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8100000000000000}, 0x28) [ 231.155030][T15725] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:32 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2}, 0x28) 16:39:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) lsetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)=@known='system.posix_acl_default\x00', &(0x7f00000004c0)='\x00', 0x1, 0x1) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000440)={0x7, 0x4b, 0x2}, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x80000000008dc}, 0x28) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000380)={r2, 0x78, &(0x7f0000000100)=[@in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x3, @remote, 0x3}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x1ff, @local, 0x20e4}]}, &(0x7f00000003c0)=0x10) getgid() 16:39:32 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000000c0)={0xd, 0x21, 0x8, 0x1d, 0x2, 0x5, 0x4, 0x0, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e620fb5a4e47f6c81009d81dec4bd9cbb0ecc49bd5c3252747764c6370e9b11c2e2d56325292c81e198c210a01205df2f55efabd14fdc99a86ead4e9d00"/186], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x1000000}, 0x28) [ 231.395904][T15750] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 231.450698][T15755] QAT: Invalid ioctl 16:39:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x88a8000000000000}, 0x28) 16:39:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2}, 0x28) 16:39:32 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0c00010000000100", 0x24) [ 231.546953][T15755] QAT: Invalid ioctl 16:39:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20a000, 0x61) connect(r1, &(0x7f0000000380)=@llc={0x1a, 0x312, 0x9, 0x9, 0x1, 0x10000}, 0x80) delete_module(&(0x7f0000000140)='syzkaller\x00', 0x800) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) mq_notify(r1, &(0x7f0000000100)={0x0, 0x1d, 0x6, @tid=r2}) 16:39:32 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x401, 0x200000) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x7, 0x800, &(0x7f00000000c0)=0x8}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x2c25, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x8cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') linkat(r0, &(0x7f0000000500)='./file0\x00', r0, &(0x7f0000000540)='./file0\x00', 0x1000) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200400}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x9c, r2, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x800}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000000}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x9c}, 0x1, 0x0, 0x0, 0x400c010}, 0x20000000) [ 231.641379][T15771] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:32 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2000000}, 0x28) 16:39:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x88a8ffff00000000}, 0x28) 16:39:32 executing program 0: readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=""/4096, 0x1000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:32 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1f, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 231.868719][T15789] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 16:39:33 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0803000000000100", 0x24) 16:39:33 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8e03000000000000}, 0x28) 16:39:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x3f000000}, 0x28) 16:39:33 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x6, 0x100) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'nlmon0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1000000000, 0x4}, 0x8, 0x10, &(0x7f0000000600), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) write$binfmt_misc(r2, &(0x7f0000000100)={'syz1', "ee9dd6145886ff545c643838e3bb1756db5849dc31a2d6b041c37624183ca9450eaded980fd688ce1c2710d7ef0c3aee3ceed5d9011b061fb4997c1e86e82fb1d770eae0445076a28ca4f35beb40ac01fa7669f6e2a480a14aa8407787"}, 0x61) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="b6317a9b003e733ace02dda78fc03db0b8937232ffa696cd7b68e3bd1844e6e411bc186387256f9c044b6ca497664706c4b396e50d8781cceacfe4901b60443142ceaf37c36e91c43f4b72d02594487fa9710ce0552a4e2d55dfc80f3f1e8aab71c35aa5d39d1c8950fe081d95af8064a0f399ea2724e11530c43ed0bc90857dbd60f42a4351148c81342ceee81298810d6befb6e144acc5c1e4929710", 0x9d, 0xffffffffffffffff) r4 = add_key(&(0x7f0000000500)='ceph\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x2da, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) r5 = socket(0xb, 0x800, 0xfffffffffffffff7) getsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) prctl$PR_GET_TSC(0x19, &(0x7f0000000540)) socket$caif_seqpacket(0x25, 0x5, 0x0) [ 232.038175][T15804] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000380)=""/4096) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1df7ceb6e58a53f9, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) 16:39:33 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) [ 232.093725][T15808] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 16:39:33 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0802010000000100", 0x24) [ 232.213971][T15821] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 232.316938][T15828] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfeffffff00000000}, 0x28) 16:39:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x40000000}, 0x28) 16:39:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000ce060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r4 = dup2(r3, r0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r4, 0x4010ae74, &(0x7f0000000040)={0x7, 0x8, 0x5}) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000140)=0xe0d9, 0x4) 16:39:33 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0803010000000100", 0x24) 16:39:33 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628eb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000000c0)={0xbb08, 0xde6, 0x6, 0x9, 0xf58}) 16:39:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640500000000006504040000001f0404050000000000006a0a00fe00000000850000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead0500"/182], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:33 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) [ 232.467601][T15846] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xffffffff00000000}, 0x28) 16:39:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x60000000}, 0x28) 16:39:33 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0804010000000100", 0x24) 16:39:33 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) r2 = dup(r0) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000040)=0x2d18) [ 232.695839][T15868] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xffffffffa0008000}, 0x28) 16:39:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0805010000000100", 0x24) 16:39:34 executing program 2: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:34 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa32000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x81000000}, 0x28) 16:39:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0806010000000100", 0x24) [ 232.962187][T15888] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x70) 16:39:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b70500002b3d00006a0a00fe000000008500000012000000b70000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x2000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:34 executing program 2: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080a010000000100", 0x24) 16:39:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x88a8ffff}, 0x28) 16:39:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 233.283198][T15920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:34 executing program 2: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x200001a8) 16:39:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000000000000000095000000000000004e628fb5bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) getresgid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) setgid(r1) 16:39:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8e030000}, 0x28) 16:39:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080c010000000100", 0x24) 16:39:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640565040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d015a715a06db6262722bbe0acdb1cc44990421cbd00cb140a8ff609f1e6b49f749cdff74c7d7cb777bdbc35494879182774393b48856cb73036cb6c37f356d1300f848dd83cdef8f97c75a467dcf2befdbbf25876187167f5894ca88e6629c1f1f0d9ae5157943a6b5bf3454fda09b78f3c4c2ebd7603e36b1a3c7912c526bc8fe1ce3f31b8401d83a81ad142a9c393eb801ea5a516d4fc4d72557eeff060a6b75357ee1959664bb0000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:34 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) [ 233.583681][T15951] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080f010000000100", 0x24) 16:39:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xa0008000}, 0x28) 16:39:34 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffffb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000000000, 0x4, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x40) fadvise64(r0, 0x0, 0xffffffff, 0x2) 16:39:34 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f00000000c0)={{0x0, @addr=0xfffffffffffffffe}, 0x8, 0x7525, 0xcc67}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0xfffffffffffffc4f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 233.858283][T15975] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x2, &(0x7f0000000280)=ANY=[@ANYRESOCT=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200001, 0x0) uname(&(0x7f0000001380)=""/225) write$vnet(r2, &(0x7f00000002c0)={0x1, {&(0x7f0000000380)=""/4096, 0x1000, &(0x7f0000000100)=""/58, 0x3, 0xd43a75377efff69b}}, 0x68) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f00000000c0)=0x1f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x3b8) 16:39:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0810010000000100", 0x24) 16:39:35 executing program 2: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xa0020000}, 0x28) 16:39:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000be060000ffffffff3d6405000000000065040400010000000404000001000008b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb524e47f6ce4c59d81dec4bd9cbb0ecc747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d0000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x200100, 0x4) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f00000000c0)={@rand_addr, @broadcast, @loopback}, &(0x7f0000000100)=0xc) 16:39:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xb800000000000000, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x50, 0x0, &(0x7f00000000c0)="52d3814e7fffff3bad6c48eff04cd4e2b8acb2a42ed8fc14eb11b18b4fa0f32fecd85c5270c64aa19fb7d6ece337f0c5255366bf99ef66d50eeedfa45100bd600d67cea790f5f9c86993f93cb136bed9", 0x0, 0x3ff}, 0x28) 16:39:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0860010000000100", 0x24) 16:39:35 executing program 2: socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfeffffff}, 0x28) 16:39:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc8e0a7a2a62b11d49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_SET_UNALIGN(0x6, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)={0x8, 0xf, "0d40e4d6c93e92f20280a9de00e20576f722f42f325577dc5f"}) 16:39:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa}, 0x0, 0xffffffffffffffff, r0, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08e8010000000100", 0x24) 16:39:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x100, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000600000000000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df4fdc99a86ead4e9d0000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:35 executing program 2: socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:35 executing program 2: socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0400010000000100", 0x24) 16:39:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800030000000100", 0x24) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xffffa888}, 0x28) 16:39:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x4) 16:39:35 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) 16:39:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08001e0000000100", 0x24) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfffffffe}, 0x28) 16:39:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = request_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='syzkaller\x00', 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='userselinux\x00', r1) timerfd_create(0x0, 0x80800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 234.618524][T16054] QAT: Invalid ioctl 16:39:35 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) 16:39:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0802240000000100", 0x24) [ 234.676633][T16065] QAT: Invalid ioctl 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x2a0ffffffff}, 0x28) 16:39:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x92458f6ac74b472f, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000440)={0x1, 0x1, &(0x7f00000000c0)=""/125, &(0x7f0000000380)=""/141, &(0x7f0000000140)=""/29, 0x3000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) sendto$isdn(r0, &(0x7f0000000480)={0x6c47, 0xffffffffffffff16, "6dce9823f07fbd53d54e79d781286410250a71f5e76cfb97cf7ad3f4120103522cd3b6d03d02d991f9ad7fa63b2d6af9bdbf60e1f6fd2e63aa5869b5a726ab1fa0df1799e738b0c181b9ca70901646efb0e895"}, 0x5b, 0x20004080, &(0x7f0000000500)={0x22, 0x3, 0x6, 0x8, 0x5}, 0x6) [ 234.727889][T16054] QAT: Invalid ioctl 16:39:35 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) 16:39:35 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x6, 0x100) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'nlmon0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1000000000, 0x4}, 0x8, 0x10, &(0x7f0000000600), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) write$binfmt_misc(r2, &(0x7f0000000100)={'syz1', "ee9dd6145886ff545c643838e3bb1756db5849dc31a2d6b041c37624183ca9450eaded980fd688ce1c2710d7ef0c3aee3ceed5d9011b061fb4997c1e86e82fb1d770eae0445076a28ca4f35beb40ac01fa7669f6e2a480a14aa8407787"}, 0x61) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="b6317a9b003e733ace02dda78fc03db0b8937232ffa696cd7b68e3bd1844e6e411bc186387256f9c044b6ca497664706c4b396e50d8781cceacfe4901b60443142ceaf37c36e91c43f4b72d02594487fa9710ce0552a4e2d55dfc80f3f1e8aab71c35aa5d39d1c8950fe081d95af8064a0f399ea2724e11530c43ed0bc90857dbd60f42a4351148c81342ceee81298810d6befb6e144acc5c1e4929710", 0x9d, 0xffffffffffffffff) r4 = add_key(&(0x7f0000000500)='ceph\x00', &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x2da, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) r5 = socket(0xb, 0x800, 0xfffffffffffffff7) getsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) prctl$PR_GET_TSC(0x19, &(0x7f0000000540)) socket$caif_seqpacket(0x25, 0x5, 0x0) 16:39:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800400000000100", 0x24) 16:39:36 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040), 0x0) 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8000a0ffffffff}, 0x28) 16:39:36 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101041) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f00000000c0)={0x20, 0x2, 0x80000001, 0x9, 0x6}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800020000000100", 0x24) 16:39:36 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040), 0x0) 16:39:36 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$void(r0, 0x5451) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x2003) fstat(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x35510de9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000380)="c3128e5a948f2b9ace45a68b5c14ac3ef7f59f38fb041ce7a211161269644c5e4dcd479cffb03be4383854214df01d2366661adfdcf627d2e8f42a105c369358b38f3bae07ad40eec4e0e1d61f0bc521252cc05744aee7921ba8d750c624e5", 0x5f, 0x5}], 0x10000, &(0x7f0000000640)={[{@block={'block', 0x3d, 0x800}}, {@map_off='map=off'}, {@uid={'uid', 0x3d, r3}}, {@check_relaxed='check=relaxed'}, {@cruft='cruft'}, {@gid={'gid', 0x3d, r4}}, {@session={'session', 0x3d, 0x14}}], [{@euid_lt={'euid<', r5}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/input/mouse#\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}, {@hash='hash'}]}) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)='\x00') 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x100000000000000}, 0x28) 16:39:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800030000000100", 0x24) 16:39:36 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040), 0x0) 16:39:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0xffffffffffffffcb, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x3, 0x81) write$P9_RCREATE(r0, &(0x7f0000000380)={0x18, 0x73, 0x2, {{0x0, 0x3, 0x8}, 0xfffffffffffffff8}}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000781b30000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800040000000100", 0x24) 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x200000000000000}, 0x28) 16:39:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08001e0000000100", 0x24) 16:39:36 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101041) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f00000000c0)={0x20, 0x2, 0x80000001, 0x9, 0x6}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:36 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b", 0x12) 16:39:36 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000010002000000000002000700", @ANYRES32=r1, @ANYBLOB="02000600", @ANYRES32=r2, @ANYBLOB="040000000000000008000200", @ANYRES32=r3, @ANYBLOB="000061b7", @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="2ca3c54a80a8f7f4d64acc955b79200800f9ff", @ANYRES32=r8, @ANYBLOB="10000200000000002000000000000000"], 0x64, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) getgroups(0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x3, 0x0, 0x4, 0x3e, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r9, 0x84, 0x70, &(0x7f0000000380)={r10, @in6={{0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20}}, [0x100000001, 0x100000001, 0x3, 0x9, 0x0, 0x3f, 0xfff, 0x0, 0x4, 0x1, 0x6, 0x5, 0x7f, 0x81, 0x6]}, &(0x7f0000000100)=0x100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r9, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xffffffffffffffe7, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:36 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b", 0x12) 16:39:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800240200000100", 0x24) 16:39:36 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b", 0x12) 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x3f00000000000000}, 0x28) 16:39:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325062c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = open(&(0x7f0000000040)='./file0\x00', 0x24a000, 0x88) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)=0x3ff) 16:39:36 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101041) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f00000000c0)={0x20, 0x2, 0x80000001, 0x9, 0x6}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000740)='/dev/input/mice\x00', 0x0, 0x400) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000780)) getgid() r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x4000) getgid() ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f00000000c0)={0x8}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r3 = semget$private(0x0, 0x4, 0x400) semtimedop(r3, &(0x7f0000000100)=[{0x2, 0x6, 0x800}, {0x1, 0x6, 0x1800}], 0x2, &(0x7f0000000140)={0x0, 0x989680}) 16:39:36 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800000300000100", 0x24) 16:39:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x440600, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x1, 0x2, 0xffffffff, 0xfffffffffffffffa, 0x9fc, 0x2}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000380)={0x1000, 0x1, {0x0, 0x0, 0x5, 0x2, 0x6}}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x4, 0x2, 0x200, 0x6, 0x4, 0xd58, 0x7, 0xfffffffffffffeff, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000400)={r1, 0x8}, &(0x7f0000000500)=0x293d22cb23567a5e) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200002a55344a6300000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0eb149bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ff", 0x1b) 16:39:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x4000000000000000}, 0x28) 16:39:37 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101041) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f00000000c0)={0x20, 0x2, 0x80000001, 0x9, 0x6}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08001fffffff0100", 0x24) 16:39:37 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ff", 0x1b) 16:39:37 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xe8) bind$bt_hci(r0, &(0x7f0000000140)={0x1f, r1, 0x3}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@mcast2, 0x3, 0x2, 0x0, 0x2, 0x401, 0x5239}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x0, &(0x7f0000000140)="52d3814e7dfff43bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010200000100", 0x24) 16:39:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000740)='/dev/input/mice\x00', 0x0, 0x400) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000780)) getgid() r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x4000) getgid() ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f00000000c0)={0x8}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r3 = semget$private(0x0, 0x4, 0x400) semtimedop(r3, &(0x7f0000000100)=[{0x2, 0x6, 0x800}, {0x1, 0x6, 0x1800}], 0x2, &(0x7f0000000140)={0x0, 0x989680}) 16:39:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x6000000000000000}, 0x28) 16:39:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010300000100", 0x24) 16:39:37 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ff", 0x1b) 16:39:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010400000100", 0x24) 16:39:37 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640500000000006504040001000000011f5c76df00000000006a0a00fe000000000dfc95c9161800000000000000000000950985000000000000004e628fb5a4e47f6ce47f313af1c4c09cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86e1939d418d73852937be0b33aa8c4df39bc18deb3f5b5d73789b3694715b01e357d202e2cedf87fa80578657be743876e8e00"/239], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8}, 0xfffffffffffffec6) 16:39:37 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb04000100", 0x20) 16:39:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8100000000000000}, 0x28) 16:39:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000000c0)=0x7ff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30009000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000e3cc00f826b5f55895000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28ccfa39df705edf2f55efabd14fdc99"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="f0e7000000000000bfa30000000000000703000000feffff0000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d00"/183], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010500000100", 0x24) 16:39:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325062c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = open(&(0x7f0000000040)='./file0\x00', 0x24a000, 0x88) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)=0x3ff) 16:39:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x88a8ffff00000000}, 0x28) 16:39:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010600000100", 0x24) 16:39:37 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb04000100", 0x20) 16:39:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) accept4(0xffffffffffffffff, &(0x7f0000003e40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000003ec0)=0x80, 0x80000) getresuid(&(0x7f0000003f00)=0x0, &(0x7f0000003f40), &(0x7f0000003f80)) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000003fc0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) 16:39:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x10000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:37 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010a00000100", 0x24) 16:39:38 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb04000100", 0x20) 16:39:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0x8e03000000000000}, 0x28) 16:39:38 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010c00000100", 0x24) 16:39:38 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x1000, 0x0, 0x4f7, 0x2}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3c64050000000000650404000100000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702ea31039f337292f13be43c000000000000bfa39762261a02797c0000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:38 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb040001000000", 0x22) 16:39:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() io_setup(0x6, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) io_pgetevents(r0, 0x2, 0x7, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000240)={r1, r2+10000000}, &(0x7f0000000640)={&(0x7f0000000600)={0x652}, 0x8}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0x9, 0xe5, &(0x7f00000000c0)="d90e05f80a5c6c0278", &(0x7f0000000400)=""/229, 0xb5d4}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0xfffffffffffffffe}, 0x1d7, 0x10, &(0x7f0000000000)={0x0, 0x8000}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = dup2(r1, r0) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x800000000, @null, @bpq0='bpq0\x00', 0x6, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0xfffffffffffffe94, &(0x7f0000000380)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x22) 16:39:38 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010f00000100", 0x24) 16:39:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xfeffffff00000000}, 0x28) 16:39:38 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb040001000000", 0x22) 16:39:38 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000400)) getgroups(0x0, 0x0) r1 = dup(0xffffffffffffffff) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000380)=0xc) sched_setscheduler(r2, 0x5, &(0x7f00000003c0)=0xffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) mq_notify(r1, &(0x7f0000000140)={0x0, 0x3f, 0x4, @tid=r3}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x10a, 0x1, 0x0, "95b336ce5af4940a8d9ecd4ffabfa462", "e9ab40331711483bd2b1f14760f65da0a9e191480d634a0d4e02ca91f27df3b6f249c405d21b07d60b5b290e32a8f67e6a4ce70cbf44dbc3e1374e4e0c346f8fac1aa0b2a2c30ebc665571b5f3186790a8feb535190db082b5aa2cef0824e14b7b0e504d731c86988673a601ca6f134e1539945dbc076f2f3af780858552aa0d562b2540457b4217fcd511bcd8f57ffa6af3b745e2a19a6be1cae4b5de03edbc84d8c619850ca46a86b17891e344d8dd00363ac674763b9b25177ca3c8fe10f61b90a86dad1e7406da6a335fd95ba7da68e43cad87074ac7d5114f83d1a93d93701c7ab7ca597713aa48662492388e99cc81d598d5"}, 0x10a, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000980)={r0, 0x0, 0xfffffead, 0x0, &(0x7f00000009c0)="52d3814e7fffff3bad6c48eff04c", 0x0, 0xdd4}, 0x28) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000800)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0}, &(0x7f0000000880)=0xc) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8000) epoll_wait(r3, &(0x7f00000008c0)=[{}], 0x1, 0x20) r4 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x4d, 0x4, &(0x7f0000000100)=[{&(0x7f0000000380)="9f76eaae40ac74e5977e3481a9f8fabaf38183ca523698b1e0703c31114aa48af28518a9535bb03ef134dd9a415fe9a317e8626bb3689cc7f6443baa18592a193a480c3dae8be7c135fd2613e82fdf66d21c8c2269029a8e952069dc1ae9948354d089e30d5b89995309e1fcd7ebbaa791c95fae4b3dc0d27db6e21f0f0e9c28ccbd55102461f14b4cb62c90f9", 0x8d, 0x8f4}, {&(0x7f0000000440)="68b08f6bb123f6d3729bffa98b0ad30a8e8c2412c3d6e6fb33c6b35a8942b4cf328c0e0bdd1c9d851f593bb3340e550d1d3addc5a53db155a2f5573c2b40fc65d6a3ca20f939d7d52e862461100731a7ac0c66fca131584babc0b89ba11f0ffa4cd1ad2f26fdd5915f126e65656e18d63fa6c92baa67048284843ad4f1b2db6f32e74d6d14559b867e735bc5bb9dda73069c77fa7786e10f738dabf9f0fd8ed9cbf8df8c42db028c4fe0965b41b098bedc88deb7b47d13c120daab61e8d7b283028c0ad27245630cf2780236e859cbe241836f07d5509e4e07796a7a3e9722a4f46e", 0xe2}, {&(0x7f0000000540)="a1383600502da07cb1c0099ba48705bf9e2638f22e16cd03c0711463cb2727043ba3e43925c4dd3f56d4e42217c2cd815461121865585c44a457d797f88590feaddefb26c838fcf160ca4028a537a1a062cf06ca2d6e3f8220a4946f0d4cb284e0837601820ee697b43099f6d75e7940d0dbc797a1497dc59717ee3399114137a6a5cdf8e8c8349e60962f070322149cbbc43403b9d10b75bedf89387dc570eea1aaa999b1557ea97c43057b63751ac13b2d246ca4216667d3478ba28d15f5202e8581670fb7d731", 0xc8, 0x2}, {&(0x7f0000000640)="63aa943fad48bbbea4de0b0ba457e9a16096c459a1944b971b81c08c7b6a3f1dff74fccc891ff27cc3b1c0a01920f429408c9114ce99486196284cfe30e34da7e5b003a3e968edf497c1ed6b22f5cfa13f08ab63e67e16d80200e785fd92ab8efa20c7c64e3bbf52735fbfb1fe0bab452251de451f73eef1b04e8653af82b32c21", 0x81, 0x7}], 0x800000, &(0x7f0000000a00)=ANY=[@ANYBLOB='usrjquota=,euid=', @ANYRESDEC=r1, @ANYBLOB="fabcb0aba665726af44348d67bda160efa3d8682155d73135975b58ed933709c887c0c44548227c97d7678a1e835b6ef7bea69933b980219640dd359ca609f9d06fc57b01f191e00d6e26795019d59b3be8dcc1cdc4217e260133d", @ANYRESDEC=r2, @ANYBLOB=',fsmagic=0x00000000000003ff,hash,smackfsroot=[&security)bdev,obj_role=syzkaller\x00,fowner>', @ANYRESDEC=r4, @ANYBLOB=',hash,\x00']) 16:39:38 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800011000000100", 0x24) 16:39:38 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb040001000000", 0x22) 16:39:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xffffffff00000000}, 0x28) 16:39:38 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800016000000100", 0x24) 16:39:38 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb04000100000001", 0x23) [ 237.566567][T16329] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 237.592827][T16329] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 237.606271][T16329] F2FS-fs (loop0): Unable to read 2th superblock 16:39:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r0, 0x4, 0x3}, 0x1c72960411ecbf90) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x21a2, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000257188deef7d4554008500000012000000b70000000000000095000000000000004e628fb5a4e426ccd28e77e048a1347f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efab"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = getpgid(0xffffffffffffffff) setpriority(0x2, r2, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:39 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) sendto$ax25(r0, &(0x7f0000000380)="54fcc7edb61a5c5252bf8b0687a3db8829e5c93c6551fec134d1e073f29e895f9d0c71ea6858af3811ac9418c97c7bb6d01eab677c6907d962e4595307db89f612d0dac7b1be162e920ef6eea675bf8b5b99103f2b76dae18af6", 0x5a, 0x10, &(0x7f0000000400)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast]}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000740)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000840)=0xe8) syz_mount_image$vfat(&(0x7f0000000480)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x80, 0x2, &(0x7f0000000600)=[{&(0x7f0000000500)="b7e1dc295193b4518053bcc9e1b993f68ea0dcaa54e3bc62128540b469c37654c5c7e8114ebfc409405c08325398b4736d9eb7efaa5acc647d201ea05b752e6ee39f0e", 0x43, 0x7}, {&(0x7f0000000580)="3d792e3388ee3eae90fbcd3ca2197d7797da24bb993c7b8f7aa6f7e8865049481cba83ed710f0fe270e594f98666e982fe1ce994078f7bfc4d64bdf008339647aaaf66e0f18dda0147483ddb1fce757d9968100a6fa3926539fe80bc3db6527cb06613821efa96e25a6ef8aa8710f42b823b22e039f0b57c160d31ec903a26", 0x68, 0x9}], 0x48000, &(0x7f0000000880)={[], [{@context={'context', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x37, 0x30, 0x33, 0x33, 0x65, 0x36], 0x2d, [0x39, 0x38, 0x33, 0x30], 0x2d, [0x31, 0x31, 0x36, 0x35], 0x2d, [0x64, 0x66, 0x35, 0x32], 0x2d, [0xd7d0f71f8022496a, 0x35, 0x39, 0x36, 0x38, 0x34, 0x62, 0x37]}}}, {@appraise='appraise'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'usereth1'}}, {@euid_lt={'euid<', r4}}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:39 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb04000100000001", 0x23) 16:39:39 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001e800000100", 0x24) 16:39:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xffffffffa0008000}, 0x28) 16:39:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000380)=""/225, &(0x7f0000000140)=0xe1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703002d570000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000ff030000a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x800, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000480)={0x1b, 0x9, 0x4, 0xf, 0x5, 0x59b, 0x3, 0x20157, 0xffffffffffffffff}) 16:39:39 executing program 2: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb04000100000001", 0x23) 16:39:39 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000380)=""/225, &(0x7f0000000140)=0xe1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703002d570000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000ff030000a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x800, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000480)={0x1b, 0x9, 0x4, 0xf, 0x5, 0x59b, 0x3, 0x20157, 0xffffffffffffffff}) 16:39:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc, 0xffffffffa0020000}, 0x28) 16:39:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = dup3(r0, r1, 0x80000) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000380)=""/240) 16:39:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000940)='/proc/capi/capi20\x00', 0x408000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000380)=@mangle={'mangle\x00', 0x1f, 0x6, 0x540, 0xe8, 0x0, 0xe8, 0x290, 0x290, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@loopback, @remote, 0xffffff00, 0xff, 'ip_vti0\x00', 'syzkaller1\x00', {0xff}, {0xff}, 0x0, 0x2, 0x8}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x7ff, 0x20, @multicast1, 0x4e22}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffffff, 0xeedb6e3fe8bb53bd, 'vlan0\x00', 'bridge_slave_0\x00', {0x6a2ed65a5a168717}, {}, 0x2, 0x3, 0xa}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0xffff, [0x8, 0x9, 0x7f, 0x4, 0xab, 0x4], 0xfffffffffffffd18, 0x7}}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5a0) 16:39:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000380)=""/225, &(0x7f0000000140)=0xe1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703002d570000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000ff030000a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x800, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000480)={0x1b, 0x9, 0x4, 0xf, 0x5, 0x59b, 0x3, 0x20157, 0xffffffffffffffff}) 16:39:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) wait4(r1, &(0x7f00000000c0), 0x40000000, &(0x7f0000000380)) 16:39:39 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010005000100", 0x24) 16:39:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x70) 16:39:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = dup3(r0, r1, 0x80000) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000380)=""/240) 16:39:39 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010006000100", 0x24) 16:39:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000940)='/proc/capi/capi20\x00', 0x408000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000380)=@mangle={'mangle\x00', 0x1f, 0x6, 0x540, 0xe8, 0x0, 0xe8, 0x290, 0x290, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@loopback, @remote, 0xffffff00, 0xff, 'ip_vti0\x00', 'syzkaller1\x00', {0xff}, {0xff}, 0x0, 0x2, 0x8}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x7ff, 0x20, @multicast1, 0x4e22}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffffff, 0xeedb6e3fe8bb53bd, 'vlan0\x00', 'bridge_slave_0\x00', {0x6a2ed65a5a168717}, {}, 0x2, 0x3, 0xa}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0xffff, [0x8, 0x9, 0x7f, 0x4, 0xab, 0x4], 0xfffffffffffffd18, 0x7}}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5a0) 16:39:39 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000940)='/proc/capi/capi20\x00', 0x408000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000380)=@mangle={'mangle\x00', 0x1f, 0x6, 0x540, 0xe8, 0x0, 0xe8, 0x290, 0x290, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@loopback, @remote, 0xffffff00, 0xff, 'ip_vti0\x00', 'syzkaller1\x00', {0xff}, {0xff}, 0x0, 0x2, 0x8}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x7ff, 0x20, @multicast1, 0x4e22}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffffff, 0xeedb6e3fe8bb53bd, 'vlan0\x00', 'bridge_slave_0\x00', {0x6a2ed65a5a168717}, {}, 0x2, 0x3, 0xa}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0xffff, [0x8, 0x9, 0x7f, 0x4, 0xab, 0x4], 0xfffffffffffffd18, 0x7}}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5a0) 16:39:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x200001a8) 16:39:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xb, 0xb, &(0x7f00000000c0)=ANY=[@ANYBLOB="cd400000fcffffff40610000080040000f000103c3840000950000000000000018000000050000000000000003000000850000005900000018150000", @ANYRES32=r0, @ANYBLOB="000000000000000018000000030000000000000042040000"], &(0x7f0000000140)='GPL\x00', 0x7, 0x4b, &(0x7f0000000380)=""/75, 0x41100, 0x5, [], 0x0, 0x10, r1, 0x8, &(0x7f0000000440)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x7, 0x5}, 0x10}, 0x70) getgroups(0x0, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000540)={r0, 0x1, 0x2000, 0x1000000000000}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000580)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0xc8f16fc95b559b4, @dev={[], 0x1a}}, 0x8, {0x2, 0x4e20, @local}, 'bcsh0\x00'}) 16:39:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = dup3(r0, r1, 0x80000) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000380)=""/240) 16:39:39 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000a000100", 0x24) 16:39:40 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:40 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000c000100", 0x24) 16:39:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x8) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000000c0)=""/175) getgid() openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8000, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x4, 0xdf, &(0x7f00000000c0)=0xffffffffffffff80}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:40 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:40 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000f000100", 0x24) 16:39:40 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0xffffffffffffff41, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000380)='syzkaller\x00-\x83\a\xeb\xd3\x12\xa8\xa6/\xdcZ\x15`\xe8\xe0\x1b\xa55\x15\x94\xd7\x1a\x1d\x9d\x14\x01\x9a\xc3\x06\x90\nE\xe2\x88v$\x8a\xf3t\xbbeha\xea\xbc6,:,\xf3[`\xc4\x91\x11\xaf\xe2\xf2\xb4\xfb\xf3\x9d\x86^!\xc3\xca\x035L\x83\x03\x93T\xea\xab\x993\x96\xb6#\xc8Z\x98v\r[r\x82\xfc\xff\x8e\x1b}s\xa2\x118\xf1^Uq\xefN\'\xa7\xae\xd3\xaf\xab7\'\xc0\xd3 \x1b\x86\x0f\xdb\x9c\xa98\xa8\xf9\xb3\xe7\xdaT^\b,\tc\xef\x95\xd9\xa63\xdd\re\xf13\x15\x12\xefi\xc2\xdd\\\xa1A\x03\xbf\x9c\xa3<\xb2K\xef\x98\x8de\x1eRR\xe6\xb3\x80\xcd\xc7\xa2\x95\xff\xf5O\f\x03!\xe3y\r\x9a\xc2E\x1f\xdb\xfe\xd4\xc4\xaa\x1b\x93\xcd\xaah\xff\xf4\xa0\x92+\x9e\x9a\x9a\xe8X\xa4\xcb\xe3\xae\x8b\x05\xc1\xa0\xf7\x97\xf9\xd74\x04\xa1\xa8\'~p\xa8\xcb}:U', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x177, 0x10, &(0x7f0000000040)={0xfffffffffffffffd}, 0x10}, 0x5e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x181000, 0x0) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() r5 = getgid() lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() r8 = getegid() r9 = getegid() getresgid(&(0x7f00000007c0)=0x0, &(0x7f0000000800), &(0x7f0000000840)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000940)=[r3, r4, r5, r6, r7, r8, r9, r10, r11]) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x80}, @ldst={0x0, 0x0, 0x3, 0x0, 0x4, 0x30}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x100000000000000}, @alu={0x7, 0x8000, 0x4, 0x3, 0x2, 0x40, 0xffffffffffffffff}, @map={0x18, 0x8, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x101}, @map={0x18, 0x2, 0x1, 0x0, r0}]}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0xdf, &(0x7f0000000480)=""/223, 0x41000, 0x0, [], 0x0, 0x14, r2, 0x8, &(0x7f0000000580)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xa, 0x7f, 0x40}, 0x10}, 0x70) 16:39:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000100)=[{&(0x7f0000000380)="3c5622680814356f7f899ebb602e8cf2e54d33da508292b4698945cd8aa62a7e741986cc5b1733a159b6051d8fb6d945459d3a0abc02920abaa63ea4507b54deb447fd9b9e22151f9c25ee039945468ce031dfe33b46088fd2d5f40e1c5f47278a6312f5b6c80e5722a766521c9da4ceb6ddf5fb75863abfa9ca2514895399b829c0a46c2e1731365b7b9dad68e4e296c7315bb5318d5e57fb88e4eaaa43452b93a4e45d7710d9ebeb005a47c61665210ce18ce6a9cdcce75903423176e6470fcc40add0f4160d2e4b6f6c17a2dcc291ca99787a51b5ed", 0xd7, 0x8}, {&(0x7f0000000480)="491125a2b4e36294d63db76fea0114f96460447b64c081dbed0ccab67ca34adf136d9654956dd9ef10bf3dc606de97c87bf70c6ec842a6c8f19d0cbf0bfe6faca7898ed38295d2bc44baee53c99e04a9ded9b76cc0dcbea041d8a29d7236f0d9935d3698502a560fb42e32a8989a85b17d33e299402f1033c23d6ecb3a3f8733fcfd11a6d2b7b0e9bbe7b45922c4be8d3320b61f7b", 0x95, 0xffff}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="636f6465706167653d6d61637475726b6973682c696f636861727365743d6370313235302c736573739c0000000000000030303034303030303030303366662c736573fd55db42c2b6acd7649773696f6e3d3078303030303030303030303030da119dd1b2917f303830302c6967636861727365743d63703836392c73657373696f6e3d3078303030303030303030303030303030342c73657373696f6e3d3078303030303030303030303030303030302c71756965742c636f6465706167653d6b6f69380e001b0ead17a4265f9a5731c8fd440b2d752c636f6465706167653d63703935302c", @ANYRESDEC=r0, @ANYBLOB=',obj_role=system^proc,\x00']) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000780)='/dev/cachefiles\x00', 0x100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x235) 16:39:40 executing program 0: write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:40 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001003f000100", 0x24) 16:39:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0xa0002, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000380)="18785017d9cd97bea027b27f2781971a9a06017ee809dd279493cc919c9f52ea7afbd73ae3f9b137c94c5d64b948f4c27877807f00bbd9c4a7405a0f35982bf9f7d333a67431c49f970499d78a596a940c6e8e5a6218d66cb6199085e2bdb0e533ce75436404b3a5b54b7662c6c085b988a88b68ce80a23d1de2607766f175a3e45b9909e3e614bb9b44cc91880323fa43f1bdd7fb84304817ba480feea1c161229361baf7ba2250d1e64ca15497c6dc69a0e2dd648e922dd15df66ddd95b6c422b9d5dd7c00ef2c0d20c41eaaebc04fa83a980bb12111e8be350638378610f9b1d6d9f1529203d7638ada549c91ced36f5dd49679", 0xf5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:40 executing program 0: write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x600, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getgroups(0xfffffffffffffd3a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x102, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xfffffffffffffd9b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) dup(r0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000100)=0x1) r2 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x100000000000008, 0x400) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000004c0)={&(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff0000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000400)="8372cb6a0eab61e1ed55c5d056f9ca769c8e62d594702640854ff94109233deba25dacc0b94f644178470d182e560089ec3be38558366bdae68ed21d25aff4c8f9288cd78e88298da2e006c741796b1c069eee89c6134bb9451ad14e714b21ee09469cec8ba871d57f6e328e39f4ba592dde993724cb84eff6310d56f9aabc91fa116314cfdc34164fa85d2a9a523656f3790dae60b0d6441c863f80c714ef", 0x9f, r0}, 0x68) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000300)={0x9, 0x7, 0x5, 0x4}) getsockopt$inet6_int(r2, 0x29, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000040)={0x1ff, 0x9, 0x9, 0x200}, 0x6) 16:39:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x42001, 0x0) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:40 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010040000100", 0x24) [ 239.328154][T16469] hfs: unable to parse mount options 16:39:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000100)=[{&(0x7f0000000380)="3c5622680814356f7f899ebb602e8cf2e54d33da508292b4698945cd8aa62a7e741986cc5b1733a159b6051d8fb6d945459d3a0abc02920abaa63ea4507b54deb447fd9b9e22151f9c25ee039945468ce031dfe33b46088fd2d5f40e1c5f47278a6312f5b6c80e5722a766521c9da4ceb6ddf5fb75863abfa9ca2514895399b829c0a46c2e1731365b7b9dad68e4e296c7315bb5318d5e57fb88e4eaaa43452b93a4e45d7710d9ebeb005a47c61665210ce18ce6a9cdcce75903423176e6470fcc40add0f4160d2e4b6f6c17a2dcc291ca99787a51b5ed", 0xd7, 0x8}, {&(0x7f0000000480)="491125a2b4e36294d63db76fea0114f96460447b64c081dbed0ccab67ca34adf136d9654956dd9ef10bf3dc606de97c87bf70c6ec842a6c8f19d0cbf0bfe6faca7898ed38295d2bc44baee53c99e04a9ded9b76cc0dcbea041d8a29d7236f0d9935d3698502a560fb42e32a8989a85b17d33e299402f1033c23d6ecb3a3f8733fcfd11a6d2b7b0e9bbe7b45922c4be8d3320b61f7b", 0x95, 0xffff}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="636f6465706167653d6d61637475726b6973682c696f636861727365743d6370313235302c736573739c0000000000000030303034303030303030303366662c736573fd55db42c2b6acd7649773696f6e3d3078303030303030303030303030da119dd1b2917f303830302c6967636861727365743d63703836392c73657373696f6e3d3078303030303030303030303030303030342c73657373696f6e3d3078303030303030303030303030303030302c71756965742c636f6465706167653d6b6f69380e001b0ead17a4265f9a5731c8fd440b2d752c636f6465706167653d63703935302c", @ANYRESDEC=r0, @ANYBLOB=',obj_role=system^proc,\x00']) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000780)='/dev/cachefiles\x00', 0x100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x235) 16:39:40 executing program 0: write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70000000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0xfffffffffffffd3d) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000100)={0x0, 0x1e4, 0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 16:39:40 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800018847000100", 0x24) 16:39:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000000000957163e70000000000000000000000004e628fb5a4e47f6ce4c59d200000009cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd1"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x2000) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000100)=@bpq0='bpq0\x00', 0x10) r2 = dup(r0) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000040)=0x1) 16:39:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 239.702838][T16512] hfs: unable to parse mount options 16:39:40 executing program 0: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x80000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:40 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800018848000100", 0x24) 16:39:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffffffffffffff, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000000c0)={0x100000000, {{0xa, 0x4e21, 0x100000000, @mcast1, 0x270}}}, 0x88) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 0: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x72, r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800016558000100", 0x24) 16:39:41 executing program 0: r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:41 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) r3 = getegid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r2, r3, r4) waitid(0x2, r1, &(0x7f00000004c0), 0x1, &(0x7f0000000540)) r5 = syz_open_procfs(r1, &(0x7f0000000140)='loginuid\x00') sendto$netrom(r5, &(0x7f0000000600)="4bd0d603e1347bf80a6fbfce87aa6a09e4e6b54db23e549468f7550a0bc2fdb61173b1208c94edbe3667d3346ea9d9590f3fa9f54138c8b6444b5ac523e74ecfbe24fbde", 0x44, 0x20000000, &(0x7f0000000680)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r7 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r6, 0xc1105518, &(0x7f0000000380)={{0x7, 0x2, 0x313c, 0x3f, 'syz0\x00', 0x40}, 0x1, 0x241, 0x3, r7, 0x1, 0x100, 'syz0\x00', &(0x7f00000000c0)=['proc\x00'], 0x5, [], [0x4, 0x2, 0xfffffffffffffe01, 0x3b800000]}) 16:39:41 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010060000100", 0x24) 16:39:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xfffffffffffffdb6, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x200000000000000, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 0: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:41 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800015865000100", 0x24) 16:39:41 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140), 0x4) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14ddc99a84e9d9c41801d2ec0ca574c392a98e79ff4b4db804823154382c1edd916ba5a160c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet6_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) eventfd2(0x3ff, 0x80801) 16:39:41 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010081000100", 0x24) 16:39:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x100d7, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 0: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x200000000000000, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x141000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0xb7) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0x100000001, 0x5, 0x8206, 0x6, 0x10001, 0x8000, 0xb34e, 0x9, r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405210000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 16:39:41 executing program 0: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:41 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800014788000100", 0x24) 16:39:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000380)=0x10) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 16:39:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x200000000000000, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 0: socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000100)={0x0, 0x5, 0x276413f, 0x1ff, 'syz0\x00', 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b705000000000000ea0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9dda26fc77cdb37d4c67a117bb2d91d7b1a11efa89eae049b5762fc470c283da06ab9ccc32a2b38915c9cf46e1714ade834dbf694a36b300a1458663f00bae95a9caac210f0283c114d1a8de18132e3e73868821e059b631d6242c"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x5}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800014888000100", 0x24) 16:39:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 0: socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x751777feac6319ee, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x0, 0x200000) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x2000) getpeername$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@bcast, @netrom, @default, @default, @null, @rose, @netrom, @bcast]}, &(0x7f0000000140)=0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100e8000100", 0x24) 16:39:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x1) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x0, @rand_addr="3fd151f0705225fac5b90a9c25958d12", 0x3f}}, 0x5, 0x1, 0x7fffffff, 0x7ff, 0x8}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000003c0)={r2, 0x8000, 0x20}, 0xc) 16:39:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 0: socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:42 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000200", 0x24) 16:39:42 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) 16:39:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000140)={0xfffffffffffff2d6, 'syz0\x00'}) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000100)={0x4, 0xc, 0x2, "7cdea48614de992c5c92812419220ea33c16f3550af1ff9ccc30e7f7f649acee", 0x20385655}) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f00000000c0)={{0x0, @name="d462670bdc8027dc49976087f099c63bec43a4585216654773e987967cbd2999"}, 0x8, 0x8, 0x3}) 16:39:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x40) bind$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x6, {0x3, 0x2, 0x5a6, 0x8, 0x0, 0x7fffffff}, 0xb12d, 0x100}, 0xe) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000400)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000380)="68d3e8007e3a27814ccb5e688e38d0080e0fba79", 0x14}], 0x2, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x22d}}, {@uid={'uid', 0x3d, r2}}, {@part={'part', 0x3d, 0x7fffffff}}, {@umask={'umask', 0x3d, 0xfffffffffffffff7}}, {@gid={'gid', 0x3d, r3}}, {@iocharset={'iocharset', 0x3d, 'cp861'}}, {@type={'type', 0x3d, "6e365f12"}}], [{@audit='audit'}, {@context={'context', 0x3d, 'system_u'}}, {@fsname={'fsname'}}, {@dont_appraise='dont_appraise'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'syzkaller\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@dont_appraise='dont_appraise'}]}) getgid() r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000300", 0x24) 16:39:42 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) 16:39:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f00000000c0)={0x6, 0x2, @raw_data=[0x7, 0x7, 0x7, 0x4, 0x4f5, 0x2, 0x81, 0x80000000, 0xfffffffffffffc00, 0x4, 0x7b9, 0x3, 0x101, 0x1, 0x4000000000, 0x200]}) 16:39:42 executing program 2: getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, 0x0, 0x0) 16:39:42 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000400", 0x24) 16:39:42 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 2: getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 241.674183][T16700] hfs: unable to parse mount options 16:39:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000001e00", 0x24) 16:39:43 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040), 0x0) 16:39:43 executing program 2: getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040), 0x0) 16:39:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001ffffff1f00", 0x24) 16:39:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x1, 0x2, 0x100) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff935ffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c325274770800a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x4c, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x284002, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "f35a3bcd233baa00", "c8eac9031d3473b390c8421541e260d8", "df47bc10", "cf88e9205fa4d87b"}, 0x28) 16:39:43 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040), 0x0) 16:39:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) getgroups(0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000140)={0x5, 0x3, 0xffffffff}) socket$vsock_dgram(0x28, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000022400", 0x24) 16:39:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b", 0x12) 16:39:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000004000", 0x24) 16:39:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = dup3(r0, r0, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000040)=0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b", 0x12) 16:39:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010002000100", 0x24) 16:39:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xd7, "414859d4de3e63fcecb4476b17ece8ad53e669572a274d953ea3447968447f9e1740c3cc294fba90a38459bf83938fe431c137b5cf95b573b115132d314b9880473e78f1835278079ad3dfe5da71821937fb83781790e5ec0e014e8cdb992051b5400061f19e88eb5ac765d4020d36b95858997c31e58145d56bb4a504023a71a0275fcc7cc9bd1fe556a240cd6bdade9976148482f634aa2ab06e7c8fd00744d3af761fea987a577cfb896a61e904954a85b3af9122897445bbd37bb134717675b1a87409205769540ef03906c0b89f9b3088b388cc0f"}, &(0x7f0000000100)=0xdf) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000004c0)={r2, 0x0, 0x5, 0x0, 0x80000000, 0x7ff, 0x3, 0x1, {r3, @in={{0x2, 0x4e21, @local}}, 0x4, 0x8, 0x7, 0x4, 0x1}}, &(0x7f0000000580)=0xb0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$NBD_DO_IT(r4, 0xab03) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000005c0)) 16:39:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff50c857e15c209e92eb075c2cffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b", 0x12) 16:39:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010003000100", 0x24) 16:39:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x1000005c4, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ff", 0x1b) 16:39:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010004000100", 0x24) 16:39:43 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ff", 0x1b) 16:39:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010005000100", 0x24) 16:39:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x32, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000000000000bfa300000000a9aa0703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d49333062e70bdcadefcd75324f8adfab4d8786fa07dfb0c597116435dc67f178ca2fd868988c445cc511c66c1edcf9c5c7cf197ca099accd7ee4fe3aa3cd0dfed91ad295161e5dde75e0f853f83349a8c128dba2440370b913def2bd5b43c726bb06272d8ecdb95c7d34884b64ef6f1adcf7f8c8a23d53bcd16431f6a2b27751b1f44964be101aaef606ed1f1edcfc18753ad91e58a1f2650948bc077d5407a1a6c65bedc6536806eb496d1599dc7ec1fb3b4ad1c9574bbd980a212b1e5d0e9c27ab7ca96b761c7e405d97a98c9b0bc20f517d268d000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xffffffffffffffd9, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffffffffffc}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ff", 0x1b) 16:39:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0e0149bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edfbf57efa301be84ae6c3bb98f0e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x121, 0x0, &(0x7f0000000380)="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", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010006000100", 0x24) 16:39:44 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100", 0x20) 16:39:44 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x1000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) sched_rr_get_interval(r1, &(0x7f0000001380)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325294a88736ffa627c9010c7c62c28cc9dfa39df705edf2f55"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x8) syz_mount_image$msdos(&(0x7f00000013c0)='msdos\x00', &(0x7f0000001400)='./file0\x00', 0xfffffffffffff000, 0x1, &(0x7f0000001480)=[{&(0x7f0000001440)="53f373a4af53f120c19f", 0xa}], 0x84, &(0x7f00000014c0)={[{@fat=@dmask={'dmask', 0x3d, 0x7f}}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}], [{@dont_appraise='dont_appraise'}]}) 16:39:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000a000100", 0x24) 16:39:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000100)={0x0, 0x0, {0x7fff, 0xfffffffffffffffa, 0x43a3ab03, 0x20}}) 16:39:44 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100", 0x20) 16:39:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100", 0x20) 16:39:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 243.442473][T16875] FAT-fs (loop1): Unrecognized mount option "dont_appraise" or missing value 16:39:44 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000300", 0x22) 16:39:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000c000100", 0x24) [ 243.656279][T16913] FAT-fs (loop1): Unrecognized mount option "dont_appraise" or missing value 16:39:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffff4d35ff3d6405000000000065040400010000000404000001000000b70500000000000009cb11ba48589daf8500000012000000b70000000000000095000000000000004e628ffc5be47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000480)={@dev={0xfe, 0x80, [], 0xf}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x5, 0x29, 0x589f, 0x400, 0x8, 0x40, r2}) 16:39:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xcd, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x30000) getsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000100)={0x2, 0xf, 0x4, 0x4000, {0x0, 0x2710}, {0x5, 0x2, 0xa66, 0x401, 0x0, 0x6, "b35b7aea"}, 0x100, 0x2, @planes=&(0x7f00000000c0)={0x9, 0x7a, @mem_offset=0x237, 0x3}, 0x4}) 16:39:44 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000f000100", 0x24) 16:39:44 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000300", 0x22) 16:39:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unshare(0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010010000100", 0x24) 16:39:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000300", 0x22) 16:39:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x1, &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[]], &(0x7f0000000340)='>l', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x6c, 0xa7, &(0x7f0000000100)="25565292cef77fe6da6228ae9e16131c158f287cb30243ad5fa43d736da1357a78f86a389e277bc36976fb7faafc95c636670677a22e883a1d2e1bf356db9283a8113042aed3fd93812a056df464cd985af23c48b5f8f4e1a6e9d872b8c4638e2e02284feb3f6f9f4248156f", &(0x7f0000000380)=""/167, 0xff}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x1], 0x2) 16:39:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000380)={0x0, 0x7, 0x1, 0x2, [], [], [], 0x6, 0x7fffffff, 0xfffffffffffffbff, 0x20, "72bf1652afdfe5d48ab3c7e13598a717"}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010060000100", 0x24) 16:39:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100030001", 0x23) 16:39:45 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000003c0)={r1, &(0x7f0000000100)=""/102}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) prctl$PR_SET_FP_MODE(0x2d, 0x2) 16:39:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100e8000100", 0x24) 16:39:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100030001", 0x23) 16:39:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060040ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x1) 16:39:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000030100", 0x24) 16:39:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000050100", 0x24) 16:39:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100030001", 0x23) 16:39:45 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/autofs\x00', 0x1412c0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6b0, 0xf0, 0x3f0, 0x330, 0xf0, 0xf0, 0x618, 0x618, 0x618, 0x618, 0x618, 0x6, &(0x7f0000000800), {[{{@uncond, 0x0, 0xc0, 0xf0, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x9, 0x5e, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22}}}, {{@ip={@multicast2, @dev={0xac, 0x14, 0x14, 0x15}, 0xff000000, 0xffffffff, 'team_slave_1\x00', 'yam0\x00', {}, {0xff}, 0x89, 0x3, 0x20}, 0x0, 0x210, 0x240, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xc, 0x0, 0x1ff, 0x1}}, @common=@inet=@hashlimit2={0x150, 'hashlimit\x00', 0x2, {'veth1\x00', {0xd4d, 0x1, 0x1, 0x7, 0x1, 0x4, 0x0, 0x8, 0x8}, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x161b70b6, 0x0, @dev={0xac, 0x14, 0x14, 0xa}, 0x4e21}}}, {{@ip={@loopback, @loopback, 0xd74d9d3f45c69d5d, 0xffffff00, 'netdevsim0\x00', 'ip6gretap0\x00', {0xff}, {}, 0x0, 0x2, 0x1}, 0x0, 0x98, 0xc0}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0xff, 0x1}}}, {{@ip={@remote, @empty, 0xff, 0xffffff00, 'nr0\x00', 'ip6gretap0\x00', {0xff}, {0xff}, 0x29, 0x460409e9e7728480, 0x10}, 0x0, 0x108, 0x138, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x1, [0x1f, 0x2, 0x1, 0x400, 0x6, 0x9], 0x3, 0x3}}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x2, 0xd80, 0x1, 0x1}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x1, 0x4, @local, 0x4e20}}}, {{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x62e08915dd71442a, 0x200, 0x0, 0x1}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x710) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") mkdir(&(0x7f0000000700)='./file0\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000060100", 0x24) 16:39:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640500000000006504040001000000040400000107000000050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x1000000, 0xffffffffffffffb9, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffeed, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffe}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x0, 0xa4, &(0x7f0000000040), &(0x7f00000000c0)=""/164, 0x1b}, 0x28) write$binfmt_elf64(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x4, 0x800, 0x7fffffff, 0x83de, 0x3, 0x3e, 0x20, 0x2bd, 0x40, 0x98, 0x5, 0x1ff, 0x38, 0x1, 0x2800000000000000, 0x9, 0xfffffffffffffc01}, [{0x7, 0xdf1e, 0x8, 0x0, 0x2, 0x6, 0xfffffffffffffff7, 0x41b5}], "980cf695d1c20fe33b269385a1fc1679b6b2f792323b5f2788edd4bb1f530f41f3a93f912731104f91032c5854606bb816", [[], []]}, 0x2a9) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x80) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f00000007c0)=0xffffffffffffffc0) write$tun(r2, &(0x7f0000000680)={@val={0x0, 0x18}, @val={0x2, 0x3, 0x6, 0x3, 0x4, 0x7}, @ipv6={0xc9, 0x6, "58bee5", 0xd4, 0x2, 0x2, @mcast2, @rand_addr="00b96c4516d3db709cbfa113e9656e1b", {[@dstopts={0x2f, 0x4, [], [@calipso={0x7, 0x18, {0xc0, 0x4, 0x1f, 0xffffffffffffff7f, [0xd, 0x1]}}, @jumbo, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, @routing={0x3f, 0x4, 0x2, 0xcc, 0x0, [@mcast1, @mcast2]}], @dccp={{0x4e23, 0x4e24, 0x4, 0x1, 0x7f, 0x0, 0x0, 0x7, 0x5, "cbd435", 0x9, "285bbb"}, "63651a861a0ba8fc1b58a6877a638f05391994132f339ae5ccb6b73f342b0e69f2b7f942a9f5d40268de82115be9e1faddd3938b3ac994892f508f1e3c8fbdddcab9b3f7b9ddcce98e2c9b9d3b19342ce22bb6aefa3787711f0e277cc72c62ebf03a5a2f4bdd05002f4e04f3"}}}}, 0x10a) 16:39:45 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000a0100", 0x24) 16:39:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x161, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/93, 0x5d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b6050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d70656eb2d4b9640c99159a4489974b75210d2eca821a7ed122e96f41dfdd3a5af01d61fd060004a688fdbbf6dc487f412387cf3189db11ac03f018c33131257a2e45abfb956ecb89f018c416b8c8b18dab81b524273d91818c87fddb5a853f6c0bd682e57bf165c182112d5875ec7c38bc381b1d8d4e11"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 244.731390][T17015] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 [ 244.746521][T17017] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:45 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000c0100", 0x24) 16:39:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14, 0x80000) bind$bt_hci(r0, &(0x7f0000000340)={0x1f, r2, 0x1ca7757a4a04fd93}, 0xc) 16:39:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000940)) r3 = getpid() r4 = getpgrp(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)=0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r7) sendmsg$nl_generic(r1, &(0x7f0000000880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000840)={&(0x7f00000004c0)={0x368, 0x32, 0x100, 0x70bd2b, 0x25dfdbfc, {0x8}, [@typed={0xb0, 0x66, @binary="6e62bbbc8627b901462407b89ee9480d5118783cb17b81654b233b3c0b31b835db8907880d4eba603209d1c759253c103960e80ee81d46870a787ab642289f242d410a4730c49f62160aa11f72bbdb60115bdafc651b977ce95cb19af97316a8221786c9e747dfbcf3ff1e9f1b4e025a0caaf2083c83eb8093d196c74c67d8f6cea740467fac3d1a5db0707103438e9ed0bf8e802ed5fbcd90ecf9c49e1836835d349f0f7c0e76ce4d7d02"}, @nested={0xc, 0x3b, [@typed={0x8, 0x82, @pid=r4}]}, @nested={0x104, 0x61, [@typed={0x8, 0x63, @u32=0x5}, @generic="1bec8b850bd8c4f2e3098de58bb1d2be3053f7a2d59e0b2ceb4850ad590794a943adcc0d41288012acaae2513c79107bfbd057cab1504dbb4614e7696c638c233b61abf25a5fa0a513599e0938b93a81110443042b02df732c59968aae1722e663d927ac4f77ac85a7c0623dbe0ef0b63122", @generic="6713a4b623d496e218f293e762fa41751dbc5567871ddfef080de49a97f73fbdcb392bbb56bb38dc516b06689afd63db08805f2b338de2c098121f0a1a4dc309b4c16b3d2d8c22dfe17295a8e258181c6618d62f4f568fc7627989f815398d94a1abbe664c4ab99ebd94dc4f92347f1e79b494b1093c709917f738f1b5", @typed={0x8, 0x4c, @u32=0x3}]}, @nested={0x194, 0x8f, [@generic="595b989542507614ee759ac3503e08134a90c14362428b8c6f7dd29dd1f3202e3c900f274b7f74a579419a9b35c782602574e74ebd7724ac86fd143bd321422da63ee264620b0a5c1393d0e91f67405d52d4aab5ea884fd7f8d02e1ab33444e4beb5aec0f0bff7ae1db3f1f9462821e92d70ac73b749c547c38c1b5c540c1da434316ad098dd7ba6c141f79173b9d614ca91146ca8e5b1a0f0d50bf2147cf84816b1541551b843eae681fb166d5b2c07eed91d673adfec251fbf638bafe86783f13c4c920dfdf0", @typed={0xc, 0x73, @u64=0x4}, @typed={0x8, 0x19, @uid=r5}, @typed={0x8, 0x21, @pid=r6}, @generic="7bfb87014b4c41258efba81150c745616c7879496fe91847d0ea90ee5459d3830d68e7d4f810afc771c96a8a27dcd00493904dcbd4ae647677869fc091ad0767be55cd3a9f2b9618195acfefe717e3210576d97604f2f2301104feac8d5eeee225bb776a608d4c7868f85b8dfe001f2f30609cdc98649af9a86c7ccb81fa16947fd33044bd798031576dcc7b8b38db466654502f7cf18f4f4ba219b0ac11b480630264", @typed={0x8, 0x9, @fd=r0}]}]}, 0x368}, 0x1, 0x0, 0x0, 0x800}, 0x80) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000900)='syzkaller\x00', 0xa) getgroups(0xffffffffffffffe5, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) time(&(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r8, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f00000000c0)=0x9) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f00000008c0)={@hyper}) [ 244.921335][T17033] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:46 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x121402, 0x0) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000002780)='eth0#\x00', 0xfffffffffffffffb) accept$inet6(r2, &(0x7f0000003500)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000003540)=0x1c) keyctl$instantiate_iov(0x14, r3, &(0x7f0000002700)=[{&(0x7f0000000500)="3dc65d34038f727115518eff067ac33b70c585012bbbc9e69445331db64e9861708de29007683acb6ea43914bbee6f608d4a452e7ecc749a63b8ddd0d4943d8fbd9c55dec6e8731e03bae772e7cef9f21b02a64c338f28a9382c26b8e0f7efff4edeabfe0eaa57d68954301eb4fd1bbd520fbd1543ac90379d2e729aea3f06089ca9457a5dd35afdf792ca20eb343a8044b7d0f970eaaaf81a36ccac59c5b142000e8e143d8fda5650f0218ce711ea045db0bb050df9d4cbb17316fc445e170a155c4f207996e5", 0xc7}, {&(0x7f00000002c0)="7d0b5a8f742cef808232b5d11b04350077d4a08f8113aaac1acdff7e9123151bbefbb01d436e25010b", 0x29}, {&(0x7f0000000600)="33b1fb478e8bb444e424e9f2d680e474f206aa7b4c0c5b9289cafb68d5c627bb89b41b0a269167e5fcd4975aa680dffe4f54205ed9bd4c06ddb69e004abf5bc11b32854b7023a3e88a0c9ba67e7110aa8223959a404fefe2bbba57eaff41cf0043a26ae0bfe7a136d2edbd728909ab9d5269206fb63a0f81e3db57154892ea3255bd86cc2e59336042edb2dae4e6051547e7ce6c57cdc65be62e66dd1fc3ce5874722b833fdcb2ca384538865c93dd23e099e453c16bdd7237577693ccc962b628045034391eee381ee4ee9783cbd6a48318d8dd42a376c56ef8265ccc1acf9b99334cf228389b0d6d925fe083bc600b37321ff150d6fcd4ffdec49a2faf3c4ba8074253016779c2812822bcc2fa5677f314f3ef65b1743f5b161e1076f77b302346d4646065844f693fae4bd0437d69665a2ea2583927e3f417f1e9d9593dcdb51e06efae0f4392d02387d2223ad985a3571714e35d60415719531652dacf0325cad5bc2a1c217aa9f881b51f02d0417258f4f8e0c662657142b24374b4c47484e6af548d6c88a7e3546839a64ffa24fdc362c0e1e948a2c1cf37f70862b37ab0aa9fab3d2b6104eba4cabcbbe5ac4277782c13f626aaabbc5347dfd2902305cd19c50b0ca163cc7186352192db73b98cb1588152ed1b0af571f3abadc67867db20474b782de27dcd0aa26cd729ee2a9990c61613136dd68eb2492fdaf4a70b035268ec9eaa9cad1700ec53ae6d3e16a2f8f763e0e97864c6ded8dec2d0f42a43a58709eca9108c4970726e30f08e604d9270526fbaf5f87b59c0317e8514986d9b5aa577f9c9a9f79ec40cb6d8d7cff0cb39c5ea5e2c8601f5249273a7900c379f9ea59f98a24566400c2a97374fc20ad04622c986afab44a561577b47be59f68e621a8a47ab5f3a099d58c354b313c8a5448811d973655e8154b3f901111656820ed3e385d2d2af5c76b669190c369d4545e0fb2d0d1cbf438ec9fd8ae6efe5e158ecfa985d7c997ac6d0e87d2e756fed897b451b2347a8c99b7eb47c0dc877137d87db864e5df7a84bd892b2dcbf4ea98c9e193e88c9ab34e8c12fa581629dc41406f3c5dea51bc638a6c3b71787a4e8a52a577b1cd3048d93b91d1124671bf22d3081ce219648b4755ca9987477431c82caad626e7f856fcd3f88008c27949a85988a0ac8638bdb3944eede904cca8c8cab7c74cdc887bc39f3bcf32480d6321f3b2c6420adae24b1e78dc91f83212a8e035714d7fd5c8450832112677209de34a6884dd519eaf3f0319af8b024b42431bb54b22ba0762bf377b101216932cf94f297556c4389e55476eed287b46d6e96f23044c629eb0372c890391c320173026ffd1ca8b71540f8aecccecc5947d9da39b35dfdcebf4bbd3a84acf1b25b1e4116e8cec3069b110341cdafa10b8cd9d35f7123280f2d2f9f533a452c8c6aee55caca7a43746d76f0a3a7dbe8f8dacad70a2d9d719bf862a50a36e6bce4a169f3b1ccbb488e593aae269490cab01874747f1e9dd917073c60232321ff50978a67faf790e03c8927dba468772b25b75bb198acf7e15615d50b133895e9949e33782a551822e4c9730fe860fb0ac679cd96ff25a4c9e78c870274b782f36228a8347aac68a0206ecff28173b073b5047930a3617e465172ab256fb7af911ebf0ecaa9b41d5b233f3a38aa5089d111346b947f51c4db6d39ad78c71d7edfbf530b14368ad2892c69f82d0affdffb27024796ccf5acc7ec5c769874f58a28c2e8aaf464805ebd37d85da4818e37c0ba57a0a753ef5c342188f0c4fc43dfc5f78d9aacb6e443f5d86ca3e5096c477ccad2afce50f8d79702b7fc3fee2e8dcacdda33b6d2a28a1a0a15be338e87655c2bd22ae539cdef03f057f4b862a2a25942c496fb4f056cfbd0c05314f2d5ffe14efa2429813980598c7071e90b4aeadac8eacc61a45e8b9cfc1d4d7bcfca501d8d7c445dd0a672eb26715c2c2df9856225b9a6fe18ce463a119c02e3ab0c2cf9377eab73e1dd1be726903b0e7b81ffd8074f8a12bbae29e1d12dacef144d48fb5baa4bba461d81e6e2df782ef49e7409a84454a7c0e371728a92eb9505913c0200e9e20e6b4a61d0e5b1ba7b4f1d6651040536ee1e19cbc5b2e04da8336da5aedce71a654816acff3363ccd45682b0a0f28aec933fa85ca0bd06dc66b3cfcb943265248cddfaaa6ce1dcdf6b7542897a7d3ed51fcb6da08eac43b0ab0cbcfae712a7b46d6a30a059da56d2f9b83b7917b7491440ce0790f69e015b36861243ade51c97f56c722e7c28ff60a74f38028c4b3c50eff3fb7cf5c702611590e632e2b592c1d68e42cf26955fc358b2b68735bef770f6298cee0044612083c1bdc4357a992e261cb5a75e424efc2506cd0c7d91c1e6a66a71bd58714d6bdf76f3ac2590630122bfb38f80f7a638bf27aa37dc998e23760f5f3f66af56ef608fefa83b8375da53cc65ac59fe12945f4c87849f2ba91d5dbbd4eb823eb4a43bee00901b567e36da4f9d601c385e06bc60e2fec36debb2c31a6572cf3e6e9c7624df54c2d55e1f6be40384cad96b7ea38432af8ae83e795a17af84d7d6d90ae96a543eb07cc5d4a11477358deb23db24a096e5bccfbd9b19edc8edd83137fa5388effb346f58f168302a3bb17f8ec6587a65d73b3b80c84edaaf6807e8cce5691497b4cd5ffb0aa0e7cb927facc44150431db100bde9499479185cda3b549251df1712b207e9ddaac3198fde58391a8326631706fa11957d2c88b1781f9663effb06ae5a77b6eb67dfebcb4ac9e336772a60cd750f5cc4a6814a508c9d4422088a77c8c559ddebf41c814a66d80c831c5a1451cdf52973f221139fbef501f5406c7981bc1dd61cff3ad7bb111279c320bdeed8986be191f189797e3249e44d1b09a8dd596eb9a5f8e19b4c54aeb69c911499e9fc062906df4f56750f5cc5008434c034af74ca4de5a578806a8990545906d1a643b6b3b3f3bbdf3de86e38cc0e914645c1a4e923e32f9ac7213bfe0b50d63890eebe5cec30118dcaf9b85bf5792746fa0aa1600da649841c49e3c7375aac9d11320b341bd50e87593fc25d6f4e0c3e05c4a77156b3c51a7237300e4d4a8c592ecafc1b29abb253102ee0b370a1956a11fd22910601f05a05da787f3db327fd93fa96c7a5de635ce0924c2af8c65e5c438208d13353e85171e5eb609cd4be12ac87bdcad315810a828fc8f88f44da1e4acc67235090a8c972e20df226fc0d79f6127e047d8771f8302c5f7e5939136a1468fb6d0451a519f975d982a475c5418576e79230b5582002fcab9d172c80bdd46c72e17dd244fbaf7421f0244c0cb95f5f59922809b990fabe1e2dcc435a96ecfdc2ed8d02901cfc754674f42cf18f0ab3ac56ad3d49a169068fd874302f2bfa664dddc7d1339557a36436ff79abd6d1e2481bbb2456cd5cf223edb0a2afeb4e8ef7e0d6304d431445639e810fe4f1fbd481438a447cb2f2a36e2b62d53a878d9e23ed845ad5ee058fbda60beb076da54d7debdfe0b15961eda65de8514adbcaf2f6a1688ca9f6db8d568e7a3ce4105d006b5165ac6c452bad3a7eb17cebd1c4b4709a75972f11e9dbc9e27cb5a8f12444ddfca17c195a41917970e12103bcd36dc9696c5c723d42f90f95f5839ae0df23c5c013859bf5a596bafb8a2fed8d06df54d3874c37a287da082eba7140d28bca96e6d49fe6e4baa575173091c58e767d36769163e075a20d37e24d8932332e58de53df177b0f4e465a9390fed4cee9796c524f8ed996f617bc2c6989c91927008f53bd1627a8a5b36864bb343ae08645ac9501609dd637e5837747b773552e0541aad3910f8b2b827d2fad13562ab39fbea427bade44d32ea17a7b380ecb764cfa0f1e95e7a0e7bdeab2203332017747ad8b912965cea244b5ddb795ef5c0dd6271176761403359eeac6dc877aead40472c1052bc6de7c5cbb87c93dd61a9bc1d09a4627eb3f3fc98e39831120baef47d5e4fe92d61e34b910b623091f96b76a356e47cfb853d08f24085c53e0de62e7f4f814fcd60ddb91f757d049419a14c3a928e90857b9324fd2987394908a9ff2eee6767c6859c7c7989b143e0abca1f482b3fd035b11a2018b911b60f4469c2ac5e2a48430758528c8fe0955405a45d10c9d07a7aedb92a1b5d358ea479e8599e20d260212d71dc6a48db0c8ee9940dfd8d59fbaf19894561250bba14e6053f1f2cfad64ad0c0172f7725b9ea361dd60f56be1715c474a630616aaab630831c329c2e0512b3e434bf4ea2ccc0a03e3c06268afe7f6c2c0c531667f66803dea04b6fd41c4ba2948983c6bd5c17975bf5648fd0582ddb982eb881d5d04c563b9beaf54f41b15f0cffc6f9a258b7ec5076d32b5c5b0eb380cda16f9076ee4ea88ae0c9efbf1c593e0261d9f4441633ddfce395aa4804202ba1510a9d3bc1a064e855e1ebf18194095fb324e4e1b86b5ce7def90628fd7aaea40387abd17fade296a5dee1070409e0ab2978014b641d46961ead9684079d50c3f23532ef6e346399aa494e93e4a36b59bd06f4598bdd2681c7fb6ac0de7cd7d92ded51f76566417775569387f3094a5cc3860daedd47cb83244d1e62973fc525b068770306d8cda4ab245f9bb07535e07906fa074c48b09c116e7d808fad0f2acafb01e66ac9149905663c94dbe2ea7443d781df3bcaf432caf8a8e514fe6acc6c8ea7f2ceb2d157dfa6fb7e3c6b1e7246603566bcf3cb0b3cecde9dcbcfcaebaaf90ce578cf60db5f8c4de2b7e8e7dc1b7ce8ff6caf2c0afc083140ff5fb32caedf927bf2b3842518f3f856b5fbf5f759ddae7a9d7b5c81f1fa446aa58590a2335b6606ed676fca461ed2239ad0b63fbf75c83dcadb2485fd8a5bec9c3102e2ebaf4d4f594a3bc5e59fed63e4d55670396f49c6f91f80ae3c28e9c40f87c8688334304d5235cc45702f5331566ae95152ef2142932f758992b536d9490d296305d54c1ce3471a67e15e955169ef8241b5a0fddb08ab35de7e7b9eca8969af414dbe959e7124a25ebce3de9ebe01797973a5f780cffed712165f51ebbe55284ba94f81a6b530fa035fb5dee3c5e5058a4382389228dc88d0ae9dce0142a1115ee3b11afba7401ffd975af1f141a0047a3a4db5cd85b6fb66f1ea7acd5ed3f54af2837341034b5f776ad0247cf393e946e36c2baa035ea8e8b4f95c16324e2aae793fbdead0d9074777314c05b9b27567abe5b41df34dee32f5a269d0e72b9e57af5feca68c6366054fdd397835ca3374bceff3537337371f5b8fe7f1840086b77ad6ab0b676df7e690281a6b6818d78b8d6815f8b8af1d9b4e765850abf51efcd90eb090f075c61b6883bc3ad329b842db1720a02a29dd291587d2acfecaa38486e8806c1f7c44d027bd0f836df4b35c484208217ba7b66a4a27b4ad0b85da9756d59d6ce701764c78b9d754e4f8a1ebd1b6ee6efe80c41e507e2866138b0ac5e2ba954f7ae68123f4fe398e8678918a65ddc8574457ec216c14eb719e40dacf653c241096aa5000cd3e8f56a0395839228452af1c078e1a7013b5397b5e5045c59b5efa6ce4a6889fa077888140c0611eae967aee9bd4442455df07c5849e1050a8db2cdd64193dbf438521c9def7b9d4984f5955a87e620d712e38c7f8f6d2445f5bf617076c501353d6adfd79f7d08519414886c3eff9d0d482cff108bb1ad6f37ef350187953ba10a9f3215234ce62914c8b7c150bb395b460487be61ca3f2285679fa65efc2c8f2ebb782553aecf3c0af897ba02a70f90", 0x1000}, {&(0x7f0000001600)="b365d3680788f6a5737ed2699ad590b07f4d73d767818309c5c9b18f1af9310621e6ba7b11dc3c1a608f8a56cf5df9255a5ccc066d095adfaa0c4ffaf93c8b2e825c9ef38fb7c497be6b6a9153aa3997317ba5e756cbcf41f6dbc76502f1a3dabc8850178b42b17e0161aedd04ef78b2e70e893d80e3d77d6e5b555166da1ba3992afa42229aa4dbafe897b9f264720b7c9fed86e166650e3d8cb0b183a00e3f5bf29fa3d57e942a4a52fe94221fe21cca13fea4e7ff96f44cfe011496f6a18ec18287110430412118e0b672b1cea4c72666057008b1162313e4b6ef623f1811ecfa9e41e5f47c8fee22a5b90df3ca612a", 0xf1}, {&(0x7f0000001700)="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", 0x1000}], 0x5, r4) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000002e80)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000002ec0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000002fc0)=0xe8) lstat(&(0x7f0000003000)='./file0\x00', &(0x7f0000003040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000030c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003100)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000003200)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003240)={0x0, 0x0, 0x0}, &(0x7f0000003280)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000032c0)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003300)={0x0, 0x0}, &(0x7f0000003340)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003380)={0x0, 0x0, 0x0}, &(0x7f00000033c0)=0xc) sendmsg$unix(r2, &(0x7f00000034c0)={&(0x7f00000027c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002e00)=[{&(0x7f0000002840)="9c67ba80b96d9595de9f8e95fd3eadd47e6223c5247be10a0f3533ab950461cbcafa3e6ed3f58086648ed328628f18228ff265720203bd22f593c6800be605a38d7b6a8097990c0431ce34ff91f4ff6f26bb0c66b58fde6a35ae617b410b625ca56b11", 0x63}, {&(0x7f00000028c0)="c364c1d1b88497c4381a016f23fe79c783d69f5834050c17951480690b1739bf2e2ddb593b6adb6944c3378e2a9ca9531a25ffcb3cdcab4c3cf8d96b4f45b2cfcd25481f0f9af9cbb998e284c09b8389bceedb0a70f9220b6dd231cda3972d7252c5899f8b5a561c4efbbc7c74abf9b449436004ee9290e4269b750d730a461d69a66ffa9385d495ab", 0x89}, {&(0x7f0000002980)="15e233c9a01dc51153e7bcbecc840c6a60890cb5f3f88dc1201a9f76cad23dcabc1aa2897f7adb318914f88f6ee8663d868322f7d4854c5f657894fc440272832b5f2ee7ce1163e92ec61c925c3ba377e5af7d82e3c97677de9b256c1cf2b12cf07f04852ec0adab5a5cb51153f250861f4cf77ee0f08fe97a71c99bac42b79e689a3f8bd075fd431c5d3c72a97855175d6d818814eb31e1e580bf40009cfaa556a42016b66eef8854464e35a34e0c55ed88e3790b14078e13a356b6c82f283206", 0xc1}, {&(0x7f0000002a80)="d5e69f80e6584f96a9e82153e86952d6d4840f37de5c369fb3097f7d79356bff14f2f19f27ff54a6249a52c688022b209cdbdcb628fcc76ef1aedfc3761d02fc2e00f8689320c9356596a4bd175e39a0137cd83cd2a0a9355128f598fc32270b5ccd7c39af67c6c0d86d5b7a389dbfb731ebece09949f7a9c4f374ba0b28f66c96bb7f72d9d0c27e60cbb30c498df69d46309852fb76b2fd11d3ae008cccac634de87cef5fe90f8bcfb9596baca9ec9a1b0c5f3b40579b62e5d155744b44c8d988f026c29510762a67763df50c3b90bf123504d1", 0xd4}, {&(0x7f0000002b80)="5594396bba8960703eaa097ff762f167c4e38e176526ed3d2c1be73d2388e63a4ea4c90918bba317c2e340c3680954afb9126e9a39dab001a83896b857057e1d88b1ab5845516231d5ac74dd443cea73ccb434728a95b2f49a2cf04c2d0a0269996a5b297c63325545459ba61893d4490467ca1a2e0828eccf21761f07038cec83ce471a64589ae7f68fef864935f4ac170782f5992f2aa479d0e66d0894058315bc94e9d025315208fa91efdb722a2d1e443a00e7c55246601306b613f7ad656d99818dc8ee7c5696bb0c42ec39b7357e821d3e0e8a9882a05bdbaa9d09fe5fd95e0c8415854f336c15f63de8", 0xed}, {&(0x7f0000002c80)="094b4c0fdbf86d3b9c5ed54f8b3b2a0cba2cdaf969543b225fd0751e32978811499138b0516907e2530720805d93875e84b695ba08e42a736becc89297803df78e40f54f2965b322f8b3722a3edad2f05bfbca0c03d41a3cd21e36d9d5b542f0c70106c2b5b2d2ea45c1de55c3c4fb2b7368aedac92eb5c9aa081c79a07359370ce876b0160446ab605a4d29b9bbe98a12338ffc21a6edfcc1b6c0f705605323966bf09b02ceaa71bc7a9e2665a56b935f2087ff6fce9b2ab96bc2869408e9aca7af0e5b72d35052eee3d64818d83a991fcd23fd7704c74e74600b6e4934c1e3cb033d3fa427", 0xe6}, {&(0x7f0000002d80)="139448148de3ec86a677b63a41b1a3df6ed8155904cfbf3847ba87bcb34406645701d7d73247e2abfcbf071b04efdad158de47295cfea86d86e0e643f64bd9698f69c819a94985221c3f393d1d166a303c840fdf47a2132d3d100066b1d0c48e784c03d2ef1ba0dd6095", 0x6a}], 0x7, &(0x7f0000003400)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x10}}], 0x88, 0x4000}, 0x10) 16:39:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000f0100", 0x24) [ 245.119746][T17053] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:46 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x2, 0x0, 0x5, 0xffffffffffffffe1, 0xdee}, &(0x7f0000000380)=0x14) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000040)=0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100003f0100", 0x24) 16:39:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000000c0)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x4, 0x5, 0x6, [@bcast, @null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 245.408793][T17078] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4f47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d8938c720e15520ca937debfeb1df54bd8c08"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000400100", 0x24) 16:39:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 245.623600][T17103] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff007aa4f0ff00100000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e6b8fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c23e0c0000000000009dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-monitor\x00', 0x200000, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000380)={@multicast2, @local}, 0x8) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000140)={0x1a5f6b16, 0x0, 0x4, 0x3, "f41fdc14bc02cb5c9005fec69e678cd19ef10d7bb36b3244cd3f7345dcdb0379"}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 16:39:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x10001, 0x8}) 16:39:46 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010088470100", 0x24) 16:39:47 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 245.903067][T17124] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:47 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:47 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010088480100", 0x24) 16:39:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff000000000000000000c49dff3d640504000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095400000000000004e628fb5a4e57f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d5632529802db8d0fcddb7f529bee6e3e62c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d94db5c8d679ced8021aa318a7551e37a22c9c860c06f92c8900a170e995f2ecb54148c3fffe854870969f7efdb41bd28b39cc5afe50d5240ed86a5223bc9efb8501bb0f7ccdae05b9c7d3bc08921ac87fc95388baae1035698d727a51003cb5c82d672789870d7f846499c508e0bcfe39383d33dd0d21f8b8d210a6e13ac2dce0084b226de1191a9545d1c21a9ac0ee02b0f9ce552166615b43f59bfdba188d10bbc49de09f1a1cef874d99a8570c3d0fbf12ee24f9b21e42cae8d9d2da3b7e64a4e26dd065a1623346c15e6488694d97cbac71a4cd7c39b6a1b9ce8159d2b2ba8300bb92e46446c9f8d22c5f7df198a118f063cef1ce1b26e0b91dcfb"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x2, "930c30938228a35d"}) 16:39:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 246.076629][T17145] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:47 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010065580100", 0x24) 16:39:47 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000600100", 0x24) 16:39:47 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 246.324233][T17167] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:47 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:47 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010058650100", 0x24) 16:39:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, @perf_bp={&(0x7f0000000400), 0xb1f4430c4c856c2d}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8e0}, 0x28) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000440)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() fchown(r1, r2, r3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'hwsim0\x00', &(0x7f00000000c0)=@ethtool_rxfh_indir={0x0, 0x4, [0x2e8, 0x8, 0x401, 0x3]}}) 16:39:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x20000000000, 0x0, 0x0, 0x0, 0xa78e306ef25caf00, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x1) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000810100", 0x24) 16:39:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640500000000000300000000000000046a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$void(r0, 0xc0045878) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) [ 246.564684][T17194] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:47 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010047880100", 0x24) 16:39:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) write$vhci(r1, &(0x7f0000000380)=@HCI_ACLDATA_PKT={0x2, "41cb27c2db9a0bcde71712f5596ea789c7d4d981b0e85ba5eb991085be2ffd72dfc30b342b512595dcb150785b89b67f7f28fdf5104dae9308a9aab2d5908e89258bb5fc2d7617715d8a1538239270675dace061a3d497136caed14994803b6e2b2b47355e4894fd92b37d51c89989e107f20f4a55e45c84e8ab9e36edfe0c4d75cd4320dcbef947313dfa1e2055dae5c72c6b4dee3c2e85f7946a9aa59b93b8a0f0232176b79663eeacac0e60cf95ba1808cd7c379f72139c293d1c8aace72afa9b85656bade7e20860af36845d13074ace236f1c"}, 0xd6) 16:39:47 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:47 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010048880100", 0x24) 16:39:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "749a645d716d79441c204dd8d4c241a47310ae34"}, 0x15, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff7900f8ff000000006aa2645316eace9c3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a30000d1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000e80100", 0x24) 16:39:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xffffffffffffff12, 0x0, &(0x7f00000000c0)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 0: pipe(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:48 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000003", 0x24) 16:39:48 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x98, r1, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0x3e}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x28}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x40000}, 0x20000084) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0xffad, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000004c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000480)={@bcast, @null}) 16:39:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000085000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000740404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 0: pipe(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:48 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000030000", 0x24) 16:39:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000085000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000020100", 0x24) 16:39:48 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 0: pipe(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000085000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dd}, 0xfffffffffffffe3c) 16:39:48 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000030100", 0x24) 16:39:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c32527477"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7eb8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 4: getgroups(0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x8100, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000036c0)={'vcan0\x00', 0x0}) fstat(r0, &(0x7f0000003700)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003780)={{{@in=@empty, @in=@rand_addr=0x400, 0x4e24, 0xac9, 0x4e24, 0x0, 0x2, 0xa0, 0x20, 0x0, r1, r2}, {0x0, 0x3ff, 0x1, 0x3, 0x6, 0x13d, 0x800, 0x7c72}, {0xe5, 0x2, 0x8, 0x800}, 0x5fff, 0x6e6bb7, 0x3, 0x0, 0x2, 0x2}, {{@in6=@empty, 0x4d6, 0x3c}, 0x2, @in=@rand_addr=0x9, 0x3507, 0x4, 0x2, 0x100000001, 0x401, 0x2, 0x7}}, 0xe8) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000500)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r4 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6, 0x6d023499428cda9c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r4, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e22, 0xffff, @rand_addr="3f93985b86e43370b741a5482ca11216", 0x1}, {0xa, 0x4e22, 0x80000001, @local, 0x100000001}, 0x6, [0x90, 0xfd71, 0x0, 0xd58, 0x2757, 0x7f, 0xd4e, 0x80000000]}, 0x5c) r5 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r4, 0xc1105518, &(0x7f0000000380)={{0x9, 0x1, 0xfc41, 0x6da4, 'syz1\x00', 0x2}, 0x4, 0x4, 0x7ff, r5, 0x3, 0x0, 'syz0\x00', &(0x7f00000000c0)=['mime_type\x00', 'syzkaller\x00', 'syzkaller\x00'], 0x1e, [], [0x3, 0x0, 0x2, 0x81]}) 16:39:48 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000040100", 0x24) 16:39:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c32527477"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:48 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000050100", 0x24) 16:39:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c32527477"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d64050000000000650404000100000004040000228f7dff401b01000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = dup3(r0, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000140)={0x1d, 0x4, 0x20, 0x101, 0x1c2, 0x9}) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000380)={0x3, 0x0, 0x2080, {0x6000, 0xd000, 0x2}, [], "00867bc1e953a1c09936bb853ca8a0a0f157ab4108b8d24626b0dab5a84c0a4b7db689fb5c260bc9ce2ed4374b9af57ffc295ea77aa986467e01ce794a5123f20376900d5beb363aaf3754d2e025416ffc870cb3fd0db40b40547c60882053ad2742def97fd30a4dd28f057e2675f5e9ecd9b7184a3558e62bb1cc6d4fc7d962d2d5c54742a0e04698cafcdebf4d3d34697d6f73ec9814da7c5042b1c54ccbd30cc36b9ae9591f0339ac2902cdff2180dc4e4ef9d9706df7cf6e20d10ef56d87f58d4841b1e02de4e48714dd00e97653ce4a697d0bd1e07d122e69ba971c4a63d95eb11650b28795adbfb22909e39b125c6b75b42a52d4298e530cc9409bd2c8afe25a113898d12379b41695ef48da27fbe7a7763e2ef3b46f4fcf437bb22767e63dd37869c0005ce7e58c8216ff02ef3187d50410433985d563b46f90c9c8d44d062eb0a0f5e51ba1935157bf231198761476c772df476bdf17f7c5f4d71bab58e5bb108077b3580fb331a1a8f803ff683b87f30eef3391984205c7f2f689c3a2a7ba5119d2835c42c638125c16782a5d047f600421c5621aeb82252b1efc15ad14d1d3752248daceb74cac0845fef740a7b8296d13993ea25a27be971317632487eab2082a1ce3551193a074127fae50aa1c6bd02ee06d00ba5452d0de6e973e598b635bf84e23714e2672668f6a1386430a0f18339659d8e96045fd9b82bbdb5eb07b877c86b091bf71de1652d9c9ad02e78e30bcadc47d3eac328f0b77b37ddcc83b3930933af3304c652772de9d36f42cd6c97a10ac07c6204cae0d86017f1a29300321a57062525e975862c3702d2c51bac46453171b2994f2bc0a79121ef2d55f1b149fe1a29b9d336d94780c020326c4c853beda09e969daeeb34481b5f136e31a19b902c06c7a5162e87686ec014e34fba019025d114083647f097ba1ee12da4c3a5b759a6ebd634a6d8df99cb9c8cee02a2e882f4a18d4cd5bf2263a1fa137fc78606bcda8d84e348cfc033cdca035e761114894217fe2674d75528316f25e0bb1747837fd99139f0d13d815aecd78fc6fd3cb74b4ffebbf316276d7f2ddf3683737d00502ec2e441e1b5e09295789ecf474561eb29180d384dacf57f544986f5da1914c911bad1c065e45fde75ad30c1aaea5695debe48271d5b8fce70b7c88510fbe6cb9ef2a2f491fe36df4cf5483d84a34c46e1c9f332a2b7252873e89539688cdcb32bf843a973274f9c669138e0ec80f3171df19e695fc5f4ad67c8f84c9afa5bf956c7fd9f0a275088af54726539f8e6675dc0b1a2abcc38d1bb2ef29e0bbbb95af6800a77618809017b585ba93a63b8d9134b23a6519e5de58ca484594833d3c60ecc0cdd05b5b61c112af27300af9aed370cb44be509fabf62eb9086bbe540ecd34dbf9e078d3570276f67fd1138f63ba22c5319b23c0ede681439a444aa183c0600730bd29a31e901b4b070176d92a2cc184425c8240e6f4db60b409d7c967b253069353322a7a736115c74fcba24ca1e4ec8b8b9e9d9f894ab5cc5b3d1ff390d05173ec855cfc07f623b01fabe8a8cdffecc5b204fb411e7056d10988dcf4364c32f10df4d87539166e46005a050b77644f8fb24aaf51c202a3442149bc407dd7068bc532325376ac46099576b66be0e21a8d60f2218f31bbf969ccc401e1c40d346ddd9aeaf0ded676547df7d6e42aa1240a218836726577d1995a7448d72bc4a246b3721be8041c939b046e8c27a53bda731151104d98a42cc9e133ca652824d2b3ba443ca0fa2b2959216d1b654f51985b025c19c169ddc331db47adfe211d6d32bf94bf79b5b5626dc9cc79ec9b952d6323e363c3c0c818c4676d4482037bf5103f5fbe1d8629c3c2c5516ceae794bb5409a5b6406cd16cc63bc8039fe6b583f99e63b34c6d0147249f27b2d3f37b8f83d6635d4fd9fb5f5be7efb0ea95fb430be1110e2599a75d4a455fa78f85b620b6cbdc4bcebad286cce892a69727248156eef84896ab950fbdf2c6b3192b615978617e2f1a5ff335971954e3705b0a1164ac4360165e853ed2b3008870fd63405f9950ed712e68290ddc4ac308a4aedcbc3d9582fddc7905df6169a5bab744ab374312bcf16594a15d4ba92d22942515cb1687599b43dfcb806870993f42333ffd707ed15752e9550915dc03cbcd4ff80f7382ec3177ef9756d817d43e32d458d34ba4721844fefbf7f10609dad85b63febe7e4524d56fef48ce611c17f2cebfb460de0bb54b40312e8019603a1fc28e9cccddfdb9b762503ddacb2cbdc2abe71e1d5e519aceb09c8b6f41aa7234faac4dac7982ed6a250260d1c119ddac193e9f8d22f80201fa5c67210ec759e38b4a73e9f656be2fcf99d6988bde487b14b00cf48c97d1e160626bfa12ba43e97cd446fdbe7a361082a4544301fdb06f48d0c469a8857e87b556485b90f4bebc30554e5371c627889daf2a67e1563a6df33e8e06ece744007fbe27291ea92391bdd0706a7566339eab9e37d402150e04afb275bd38178b573d4997446a515e4d76a11d985a6eb02ec93ed201ebc12d6cf25a1997aaf552a94988f2cb21ef0003d41b0b45678d7734d799ff657e2eae15b3cf744fcfccdec90238d17b99c6443cc58179f89d7f05e1749a539c9c7eaf8bb71d91f8e69e66967a942c8487ca4edb2fdda6b3ddd80650311e6558e82d4508625ecf31103c42b583e96ace16431c59a22a7dff4c3f7f2bc4bc22b98ef9aeee9fe053199f37c2909b96d59f9b2bc4fdfe0d4f70a8d905d328850292ace6adbe79ffabaa5b0d54326fde8b43f3ec92acb353b2d577cd1e26e5ff9ba803207a75dce7212a9f3f80f90f6a98bc0e797e5fee492d864e8392da0f3cb1eedc37d584ea3632ee998fc526d342b78cb772711916135fb81e4f76109610fd98cdda4fc18dd53a6d86cc9d1857d61a1dc4f465dc48ae97af19a7d1ccaf28ea5b70dba644ae0b5e1e0159f20bd534e4a993a1c2d42a7fe6fca96b10be9483a14115d909787bc2f2f7caf5d2ef367eaf309f674cff83c69013e51716552ed16c4359c6fc223402294a25f51d054c280f6c61c206a16b601d4e763512b2a5ccb8cbea2d36eb18568a5c0a028abf5df33d3b19c818717d3bac301658ee25e1d970a0cb59ed6fe41d2baec143a7b670b4f4433c1f1ba86ac6ab242c48787934d0b04d5dd198abea53e1d4cd79ce19824c21aa6f5d0406bf50d018815d6e5092e502239a56f49210fa3eb91e1f64f33c7a37c4a81f2151593134f068d0a048cb2785b88967e1b9eadb7c073d9cd72b67de6c8d8d8c967f17db29ac34ad553bc8813efc73ff61591bd7b483965da7508ad6510805946c64141f75d38534f79da90d08e6bfa1a67187a03d1f1335c34d072cc80b9373267f1a985b4d667a239c2d097f9bf1cdd43e599d5e3a0938c15fde209c8d3259cad13d404890d89c29f49e4c8d8e9b10d8b971e0b0ed1a54fe15eb764851922f69fb6d924e28dc10e3ff5ab18fdabac953d08f0e3493cf7def69b90d5ef86a1a341d4d8ad00887c893d9d4d60cdd7082287d063af7bc616ffdfc639e9fc6917a2a3bd568532d144ca593d5a405afa31e4ca3e612696f4f43ee0ae668859e4e5f54f2a0606ae79324f38d783e0ce4ab56de9b5104db8ffebc021026576b79a51b13950c9cb0f4d55cc2bc2a03876fae070173663906c8ebb5a664a5603d4d75f15f4fa3485e02072937b78d3cc42d40db18579a460e0f634a5bcae06099bf5930babc85e6585b6e8945595d04c495e5e235b4555406e11904937a724826439057a91decf04c78e2db047088c87c0c68d89e79dd9b5e49e9caa8ff2883f5202f5de4033857dc5a592a1293988cb85d2a9ba7e5be5f8a191dae00197d0ae12e4207c8d697202119abe6d31d3a2650b7bf673c682077d5f6fda4cde001e4426d9f762494de24886ef17421a3c81b6989f3c765439160c45d309f0c038613e01f77bb90c9de924380c73d69cfe3560850f73ccf380fcb0e2c2a3ada63416d814904c6fe4861fd2907d7773637e1d7a4c84b3dc7fee8ee717e6da37545094badf6cdb20dc0c3375187265a05394aa884d8a469836f4ae1027c226c1c7431c4016d4d612c7288ce3776e0049326f1661922273be9a49802ee96f745b4ad38ca9251217c624c907f003b8e6e3f5bfcb1459942f1b1c4f5a174e3d58a2b8f47dad082a0d53cb299536fe37ee168510c316ab4c2d5cf6ca37676ef8f1c781ac060974bd0511bc17d19acf093414a2d23fca6d3fb17452173f55b2b516c45b13ed6b3831189397aa96807ad9327986c2c8f72dd7d773095748f11a3c3ef890c19106cfbb85dc3d3d5e089a06e139e67b415ee9be8ca8c1fd7122612fdb7a723dc414f736a2c591dc2e0d396f4be14ae394e4af2cc2c44058359b98b77d57399d5809d364376789d663b1c85ca12374be90ffb50151955f3d32da6a0cb1465eba1cf46d337f85c23cfb5c895a016f995b23ea8acc32bfd7d77635e3533e314ba7e5de0be3e3ad0f64148f6c3f3ba02dfb0bf3a405922efc8859648ecf035d3e4bc39feba8ba141550d53a47b0c0d41b8cb0b08105db92cd7f9a762d32edaab48b2a5f0c4e57c925552fbd1e579d576d61e84f57d2d0505701684fac6f426bcbd764940362ba5343212c06d3d0656dcce79bbe31c5baf03161607b1f1783b26c1f021b0a23b627a69ec50ea6aced6832199d16d9797604381325ff9a64f6e2d1b71964331a2b1a12340f92cd1f8d1d5e1492df90edba795799498d6d13ac29e16927cbbea68f0c023290cc8aaff98793bb53f0991fea8b90afd2b994c24d716bd5fca2e720ca6e3348616ae6edd35e44842aa203d0f06306cefdee1f3d07b793b033488ac72c1745e7aa16b36ad6a1af59122252bfc0639b9e4b2c7646768000b2b5db607f366e3b300d61e6e47f56f1d8d4112a2240f118c360fd0c7e82981737dcc7955728a2cb4a6311d42d7c2019dafcbc817ffce212a574192c92a2e82afa0b0d617f9905295ef16bf89353482b86fbbe38227dd6a29d486a343c832e524a84a3d84f198629c6986eb30d2e08c33f25bd672770bce1ddf63407a8747f04382301d3ee8b222c19bdf508ce89a9c5018176a3f48e8d215199b247e3d3e8213b7fdb00a9814213ee19c4569f8d32fcba5055a3961998534b33baf8b9a89a5924c213bc2eec17b8eea86cc085fc33ecad24e65173d98c6ba46ac28ab258458c08a911e8a696923f34cc374d6b2e429b38a4d2654d9b7c7f7b8342de20c2004f0752e5969a274a39ff5003891779fb4e91b26aecc21485ab6e0a676ea83ace011ecd314499a8133e141ffa571dde2bf34b125793d806f07a41804675126ec7c7ffa8f8a0652d0c562734e0585842d0d336edaf12f3ae959d72c3803afbf08193ef26d766e246932777d7802b05109ebb130b15b9b3e1e705b43cc59190a7e293ed8e31fbbef0a602119b048b94ffd1d0ec878ae4b43ee22384595a645b3a458129a584e95e47d1ae5d687d92bd41a0cfccf9b1a0cb99b2a3845938dbda41f951fec56a7959cdc0272859da67e611dab3e64b9b9d2233243aeeee32d1b768ddeb060167f08c8dfbc06b4737e217cfa66a2ed83a0f932ffe3b88b2294af9950fabc3045378e4599daf00380de2d7b855cb92f7fbf57115b7fa0ca8f4d5d698d5c13b44998ba72047ce1cd8e15541f67f523bb0c112450cbed22bf23f376ec571dc2683ad2ebfef5ce8245843a14bc40e20da220bb860d8c89a9153ab26ded84", "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"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xff, 0x20000) write$P9_RRENAME(r2, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000000c0)={0x5, 0x2}) 16:39:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = socket(0x1, 0x2, 0x80000000) getsockopt$inet6_buf(r0, 0x29, 0xcc, &(0x7f0000000480)=""/216, &(0x7f0000000580)=0xd8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640500000000006504040001000000040400000100001b52eda057485a04006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc19a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$inet6(0xa, 0x4000000003, 0x1) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setregset(0x4205, r3, 0x200, &(0x7f00000000c0)={&(0x7f0000000380)="86fa653cccdbabd2e1d1d3a4a4ff5d83799771adbc45464886931e30aa37c583d73494bfc2b4052ddad0d7fb3aeef5dddc7a8196c7c8ce6850a5b2fc415f22ca8c1a83c49f81ecea116ee22d0e7ccb2320e1fd4eae4c8139daefebabc359575809932c492df2bb9ed59d9e931e1e8b285e7bda81d784dee1241a91d6e3035d0a3d2f81bf85e818f7c580d51217f1e5b43c5fdc0142a41ec2a84a42dd20d0537ac73c98e538a6ed2daad2d56ce02aa39188ba653ed70edce4746dd6904a442fdc2efae99a1206e94fa93fe18e4fa2216b6d31a15c024c1e164983847f3108449df90a5c98648b34288c4d6fd009fc45", 0xef}) setsockopt$inet6_opts(r2, 0x29, 0x3a, 0x0, 0x0) r4 = socket(0x19, 0x1, 0x200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r5 = accept$inet6(r4, &(0x7f00000005c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000600)=0x1c) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000640)) prctl$PR_GET_SECCOMP(0x15) r6 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000140)={0x400, 0x3, 0x2000}, 0x4) 16:39:49 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000060100", 0x24) 16:39:49 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000000000000bfa30000006e7efdcfa15eff8d4a0000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000091000000000000004e628fb5a4e47f6ce3c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46a2bce1e68cfdd6abc5825cf86135c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d00000100dc3d49bd582e3f0f9924fb2f0f48a65db80e4d898c496d81e5b798efa46e52dd632b1f7ba78d2bec7562699566f37ef0109622afb0fc51dd21af9224ac44140aeb275932b989a5705342add612291acf8749f4ae0724417df4ff6540aa536006719e58ae300b2d8dd8bc4cbb1363ce29c97822968a0802e99ab7abc7eb1268763430acadb5418f3c1d213cbf2ca9b5a1bb3eb6e9f05e02b54aa27a71d1a3ab74ace2dff1046ee389c3d4e182d1f56b1d813bd5472ea0cffb02304c44"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1636e13cde58b6a46c611c2e2d56325292c28cc87fa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000a0100", 0x24) 16:39:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x0, 0x1}, 0x10}, 0x70) 16:39:49 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000c0100", 0x24) 16:39:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$SIOCRSACCEPT(r0, 0x89e3) 16:39:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x80001, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:49 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000f0100", 0x24) 16:39:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000100100", 0x24) 16:39:49 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:49 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000280)={0x2, [0x4, 0x7d]}, &(0x7f00000002c0)=0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x1000000000000073, 0x2000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000008a0404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1f}, 0x10}, 0x70) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000040)='nolazytime\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:49 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:49 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000600100", 0x24) 16:39:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000e80100", 0x24) 16:39:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 16:39:50 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0b") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000300", 0x24) 16:39:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0b") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000001e00", 0x24) 16:39:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0b") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5c6e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c6110000d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$setperm(0x5, r1, 0x20000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000022400", 0x24) 16:39:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47b") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xfffffedf, 0x0, &(0x7f0000000080)="52d3854e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000004000", 0x24) 16:39:50 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3ad6c48eff04c000000000000", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x29) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47b") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:50 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:50 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000200", 0x24) 16:39:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000300", 0x24) 16:39:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47b") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x22, 0x6, 0x1, 0x3, 0x0, 0x8000, 0x40400, 0x8, 0x1, 0x0, 0x8, 0x7, 0x3ff, 0x9, 0x9fa, 0x9, 0x3ff, 0x0, 0x3, 0x0, 0x8, 0x3, 0x2, 0x5, 0x9, 0x5, 0x3, 0x0, 0x2, 0x3, 0x8, 0x0, 0xa71260c, 0x1, 0x1, 0xfffffffffffff801, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000040), 0xf}, 0x800, 0x2e, 0x8000, 0x9, 0x0, 0x1, 0x101}, 0x0, 0xa, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 249.943237][T17533] net_ratelimit: 16 callbacks suppressed [ 249.943250][T17533] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x17, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000400", 0x24) 16:39:51 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf0") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0xffffff72, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = socket$inet(0x2, 0x1, 0x101) accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14, 0x80000) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000480)={@multicast1, @multicast1, r2}, 0xc) 16:39:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0x800000000001}, 0x233) sendmmsg(0xffffffffffffffff, &(0x7f00000054c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1}}], 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000240)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf0") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 250.226666][T17557] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000001e00", 0x24) 16:39:51 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000002402", 0x24) 16:39:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf0") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000000000000bfa300000a077538000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640500000000006504040001a000000000000000200000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@initdev, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000000c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller1\x00', r2}) 16:39:51 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xce, 0xfe, &(0x7f0000000380)="e3637870afa32d33dccc8f8845eb99b0bf81600931669727c11ca61982f9e910427153ef9eff194b9cfc1eb436c953c32035acf295de3f89c5f32ca05da6c5c5af100af04881113992fe352ea0a664308c94ce4c27b723016a3607d42b086d2acc2fa475711deb973d427943816bb59eb88fdef70ffab681257044f841fba5d6c023d4b96339460dd5876433790097eb1854e75e68abc3cd31096d9ffc3c947d1f6212c9e9f6d9cefb727a5de6f6baaec942ea520e710788982f3f55ac376f0c1d28083d7e49dddc42870f52be6c", &(0x7f0000000480)=""/254, 0xfa9}, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 250.493970][T17582] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000003", 0x24) 16:39:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = dup(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xdc, 0x1d, &(0x7f0000000380)="25ba9e32942598235c00d82f71d6ebf2585745a11fc9861a328c12fa96f1a85547fabeb803e0abfc5b90795be1a316a9b937a7753159d4c780022d3eb5bedb28f508e13e2d5b32b18464f6a96d6a3f5591a045441055d36f4f8234136a67eb264452aca4b405bcfe8d9df6af91f97c6e6f4f2ce398043f382a13e5cf37f3cb1f9043796f1b79ab4f7ce76f3a4c291154803623b4991cdf7ca881bd1df80d750d59ebeb35ed0b6adf8edc68f40ec04e2db3cd45931d96f17c847d56903968920fb6e9b669309c28715148e125b23a39786ceb4c25586c7f4456bffbf2", &(0x7f00000000c0)=""/29, 0x1}, 0x28) signalfd(r0, &(0x7f0000000040)={0x401}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:51 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) [ 250.727113][T17608] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:51 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000001fff", 0x24) 16:39:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000102", 0x24) [ 250.893845][T17625] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:52 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000380)={0x2, &(0x7f0000000140)=[{0xb17, 0x7, 0xfffffffffffffffe, 0x1f}, {0x0, 0x80, 0x0, 0x7}]}) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x840) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)={0x0, @aes256}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000103", 0x24) 16:39:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 251.086754][T17647] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:52 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000104", 0x24) 16:39:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff950af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 251.319105][T17667] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:52 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000105", 0x24) 16:39:52 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80082, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f00000003c0)={0xa88, 0x400}) ioctl(r0, 0x2, &(0x7f0000000040)) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000380)=0xf209c864735fe5) 16:39:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000000000002, 0x649, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="00270000a0a7222b6c0000000000", 0x0, 0x8dc}, 0xb7) 16:39:52 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:52 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000106", 0x24) [ 251.547710][T17693] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x200, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0), 0x4) prctl$PR_CAPBSET_READ(0x17, 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) read(r0, &(0x7f0000000380)=""/179, 0xb3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) [ 251.638282][T17700] Unknown ioctl 1074795139 16:39:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x8a, 0x2, &(0x7f0000000140)=[{&(0x7f0000000380)="7c055e9f6b3dc000b13eb2c333657f66e29cf9eb3f0e0f50afd495503271fb5632891239c8d6ac3c1dc1d90559ff79af80ec5428a0fc9eb81cb65c6e200a331be698414558c058d23b84c9e30056cbba0fcac5351de7c5eb9b70dabf194f752f05a95a758c123c86f5eebf5d40171064d44c0e8b3de5311db11e5b63391fd6de300fe85679bd87eec82fbe91a0c3fa4d83832808084ac45aee5f796bab144b1fdca01e8bcec3e5f4b63ef45f3f2729cfe5458868fc68d2da3dea3d3a0c298c33143ae2098e353cd304299354754bb92c004eeb5da93f44a63d06f0a0950018", 0xdf, 0x7a}, {&(0x7f0000000100), 0x0, 0x401}], 0x800, &(0x7f0000000480)={[{@overriderock='overriderockperm'}, {@map_normal='map=normal'}, {@nojoliet='nojoliet'}, {@utf8='utf8'}], [{@fowner_lt={'fowner<', r0}}]}) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000001000065040400010000000404000001000000b7050000000000006a0a0000000000000000070012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:52 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000000010a", 0x24) 16:39:52 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) [ 251.708541][T17708] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000000010c", 0x24) [ 251.879555][T17727] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 16:39:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = semget$private(0x0, 0x0, 0x156868184d66313) open(&(0x7f00000009c0)='./file0\x00', 0x40000, 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000a00)) semctl$IPC_INFO(r1, 0xefeabb72597de624, 0x3, &(0x7f00000000c0)=""/153) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x400000) sendmsg$rds(r3, &(0x7f0000000980)={&(0x7f0000000540)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/155, 0x9b}], 0x1, &(0x7f0000000840)=[@fadd={0x58, 0x114, 0x6, {{0x800, 0x8}, &(0x7f00000006c0)=0xffff, &(0x7f0000000700)=0x1, 0x100000000, 0x101, 0x3, 0xfffffffffffffffc, 0x64, 0x3}}, @mask_cswp={0x58, 0x114, 0x9, {{0x10001}, &(0x7f0000000740)=0x8, &(0x7f0000000780)=0x40, 0x7, 0x7fffffff, 0x1, 0x2, 0x58, 0x264}}, @cswp={0x58, 0x114, 0x7, {{0x0, 0xf7a6}, &(0x7f00000007c0)=0x3, &(0x7f0000000800)=0x8, 0x9, 0x3ff, 0x0, 0x2, 0x42, 0x100}}, @rdma_dest={0x18, 0x114, 0x2, {0xfffffffffffffffa, 0xfa7}}], 0x120, 0x20000000}, 0x8004) r4 = accept4$unix(r3, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e, 0x800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000500)) syz_open_dev$rtc(&(0x7f0000000380)='/dev/rtc#\x00', 0x0, 0x9ed4e8e8c2b19cf4) getsockopt$sock_buf(r4, 0x1, 0x1c, &(0x7f0000000540), &(0x7f0000000580)) 16:39:53 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000000010f", 0x24) 16:39:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000110", 0x24) 16:39:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x337) 16:39:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000160", 0x24) 16:39:53 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) pwritev(r0, &(0x7f0000003a80)=[{&(0x7f0000000700)="98cdaffb42f15b1fcf52169164c06b256c0f441b10068f317e6d2280b53a69156d5a56fb1ea599b9a70a46f2e1180035ee387dd9018bcef016928d25e480c336efe21b20d442a3ef58c72668ed0c65383ee034c38abbfeeea34e57b74716855041911bfa82594e99ce9eb71358196c0f0940ce841e1e3c8c1e6c7ff785d5ac9eedfc2bf694ca0888c10f13461d01c491db18d9dbccfc798d2dee8f36fbb0ae1b1c031dd8b2fd1778c316a2137da918cf29457e9b915df531fa5b4e4099ced2416d620bf2bdc1340913091d5a480b3a9a8699457eb130972b4f0c499ac79b1a9a15a544965c998810921bc3cee25c3248f228b6a0210f", 0xf6}, {&(0x7f0000000600)="0d62de19fd253e25bc2d0b", 0xb}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000000640)="abbe282ea8190c3bcd6a369f7a6039aa0e31fc087e51a2f7fe42a97f1b464751c10d82b6a7056e37875181a23ab6f201cfd383cb01", 0x35}, {&(0x7f0000001800)="210edbe9a5a7a42ac296057cfdf6fc9ddaa9538140d0f2fa61fdca06613dadaa88299df28460698cf5b72e9d768ce5bc007353b1ce89d02702fdf0e8e5080160a19f450e8a6e5271f78b182e472525cf9f071c15c6d589ebf83c9bf4fa9f072e58a759eaca264be24af5654e91701c1b4ee8c1c057c6aff3cda7a4299c76579577aa6e5a0d48056b5c50620faab8d4eccfa85c7bd99623f62e118502cdf62300a196191d131634d1ab519f7a6b03d9", 0xaf}, {&(0x7f00000018c0)="dfb3e16f80ecf603dfcb2b5afd02afcff6bc6283bacf25ec89da1d34b4a126b433de91347f5a6cedf14b483700a3d1c50fb5b0710a28b127ab58e4272be22c21f85d3718ed350196", 0x48}, {&(0x7f0000001940)="eb240f4947092d7d301069eb81e5ac8991a532ce5fd8d0ca2170c52ca4b2c5da7933286a9dc64e2991f21ac72fbf3b24cf523e43f4c0e79953a3a3cdfaa7529e033a5429f89001536f6e326b8757", 0x4e}, {&(0x7f00000019c0)="03b2cf7119c3e5c868e82788c3f031092f3fce76e423a5bc00cd65fcc80102118a33cab9b9b3b9600669a1123356f2f68937bab0d7884ce77475a9fd8df01f3debd5d1b565758309f2b0c88cb55b9b36420f22c108ec3f9f214d7d0b747ed98c49dd439548573cf3c3977e333958736a5616d506dbfd288130b41d2620583fa3a5", 0x81}, {&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000002a80)="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", 0x1000}], 0xa, 0x53) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101, 0x0) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f00000000c0)=0x400) sendmsg$sock(r2, &(0x7f0000000540)={&(0x7f0000000100)=@ax25={{0x3, @bcast, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null, @null, @null]}, 0x80, &(0x7f0000000440)=[{&(0x7f00000003c0)="a4e74e5af178b068badadc874b1b0fc6be9267d9a3fd1c93c746e546fb2ffd9fc8b8be1ab70c879248fbcea2806db0ad720c1e45df9c0779", 0x38}, {&(0x7f0000000400)="88e6e742b630b4e9ca2d94a37cfdbf3cfef84ae6f4d56ab76a50201fcdee64297eae856e5fe9", 0x26}], 0x2, &(0x7f0000000480)=[@txtime={{0x18, 0x1, 0x3d, 0x200}}, @mark={{0x14, 0x1, 0x24, 0x20}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x100000001}}, @timestamping={{0x14, 0x1, 0x25, 0x7fff}}], 0x90}, 0x4000084) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefffd7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000085000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81fec4bd9cbb0ecc49bd5c3252747764bda3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000380)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r4 = gettid() getpriority(0x0, r4) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f00000006c0)=0xb3a3383d652f3f4a) accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) bind$packet(r2, &(0x7f00000005c0)={0x11, 0xf6, r5, 0x1, 0xfffffffffffffffd, 0x6, @remote}, 0x14) 16:39:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x0, 0x0, 0x0) 16:39:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000001e8", 0x24) 16:39:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x7db08caa6ca18d75, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000000c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30003000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b705000000000000000000fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f50e44eae81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:39:53 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x0, 0x0, 0x0) 16:39:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:53 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000000000000bfa3000000000000b403000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d64fbffffffffff64040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70500000000000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecce0bd5c3252707764a0a3e9bfd1586e13cde58b6ac61ec2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4ea937d559b5eb0c9d00a2c533c51bdb364399db6fe2973c2ee989779a6410da71d42a4af40e510cb505d79c7868b934bce2f00729d7867f0271709fa28f1ee893a4057283c625faea0073b03b593aaec60cf01809626c721418c0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x88000}, 0xc, &(0x7f0000000680)={&(0x7f0000000580)={0x100, r2, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffffe}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffff5aa}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x718ba305c989ba72}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x4e9, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x2}}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000000}, 0x4a6f2df28900cc65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000400)={r4, 0x6, &(0x7f0000000100)=[0x8cf2, 0x6d7b1493, 0x44, 0x5b5023ff, 0x10001, 0x3], &(0x7f0000000140)=[0x9, 0x8, 0x0, 0x0], 0x1, 0x6, 0xa5ab, &(0x7f0000000380)=[0x4, 0x101, 0x2, 0xfff, 0xff, 0x7], &(0x7f00000003c0)=[0x2, 0x56a5, 0x5]}) 16:39:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:39:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0acffff8ffffff79a4f0ff00000000b7060200ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc494df125bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:54 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x0, 0x0, 0x0) 16:39:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012001c00b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x23, &(0x7f0000000080)="52d3814e7ffffb3bad6c30eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000500)='/dev/audio\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="12042dff7000ffdbdf2504000000004e22000007e10b00736d70930000000002000000"], 0x30}, 0x1, 0x0, 0x0, 0x4040840}, 0x40001) accept$packet(r1, 0x0, &(0x7f00000004c0)) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0xc0, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}}, 0x88) 16:39:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:54 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000400)={0x1, 0x6b6ec385, 0x1000, 0x5f, &(0x7f00000000c0)="d98930790a141793d12d4388c02ecf273566388d2165019a923eadb71cf73c4105d236dfc468df0d463dd5c1bd5a5a850ac426b41aeb82dc966f8ce3273adde06e547d6e67f81adee9ab464dd279616fc0dc03677bcfae2332b1da7ba863f7", 0x5e, 0x0, &(0x7f0000000380)="db11c784a055b9eae6ad5251dc4fe73bed4cf76980eb5a05f89ae74f756bab7e43f2c51d6aef2e79848f8b129e836cdc7fd20e7bd6639117034b298c8d080bcbe54c652f60d6b251981110db91db1d06649053f358404ccdc730ecbba6f2"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:39:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:54 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000020004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x10000, 0x20000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x94}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000140)={r2, 0x6}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000380)) 16:39:54 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="b502000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ed81dbd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df5b16df2f55efc2d14fdc99a86ead4e9de965005108a4978dd37d18188611a00b835773e93f3d9d7bebd767c75b6a3ceb61844cb326cbb48dce3f9781360201f76d2c82f18fe7d5c1ab1b2d8395c4b3bf7ef264471e3769c3712c6f42b9b6bc546e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x24d, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x6) r1 = getpid() fcntl$setown(r0, 0x8, r1) 16:39:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="525895000706ffff3bad6c48eff04c", 0x0, 0x8dc}, 0x151) 16:39:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x12, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:54 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x79f9dfa97093e6d2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2b7, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000000}}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 16:39:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x12, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pselect6(0x40, &(0x7f0000000040)={0x0, 0x10001, 0xfffffffffffffffe, 0xe1ff, 0x8001, 0x5, 0xffffffff, 0x100000001}, &(0x7f00000000c0)={0x75, 0x1ff, 0x1000, 0x6, 0x0, 0x9, 0x3, 0xffffffffffffffff}, &(0x7f0000000100)={0xffffffffffffffc1, 0x5b2, 0x3, 0x9, 0x4, 0x2, 0x1dc, 0x6763}, &(0x7f0000000140)={0x77359400}, &(0x7f00000003c0)={&(0x7f0000000380)={0xffffffffffffaf07}, 0x8}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dc}, 0x28) 16:39:55 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 16:39:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x12, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000188", 0x24) 16:39:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dc}, 0x28) 16:39:55 executing program 4: socket$inet6(0xa, 0x4, 0x6) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000104e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d5632e5cb3517d25292c28cc9dfa39df705edf2f55efabd14fdc99"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0xffffff79, 0x6a, &(0x7f0000000580)="d6a03ef6cd420f2fc0e763b0faff011ae48de6d928dff13d116621e6b7b37964a7c9d4d345cc00929ad3b087187fb34477042caceeffffffff0000000001000000a778f8610ad3b57982d596e147225c1e509be704438ea12ea99e27df4f15d7f450a98e5d36ba358a2c3955c5ac89548894fb452d794a4fc0f87bf0bfc28032b8ccb2835b1e33ff7f11b6d4bef086a5f8f900"/161, 0x0, 0x8de}, 0x1eb) 16:39:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000008006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@isdn, &(0x7f0000000040)=0x80, 0x800) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x121040) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000380)={r2, 0x8}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x15, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 16:39:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000188", 0x24) 16:39:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x15, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 16:39:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dc}, 0x28) 16:39:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x15, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x400000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1001090}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x54, r3, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffffc}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcd}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x54}}, 0x4000000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000004c0)={{0xa, 0x4, 0x1000, 0x4f, 'syz1\x00', 0xa72}, 0x5, 0x20, 0xfff, r4, 0x0, 0x4, 'syz1\x00', &(0x7f0000000480), 0x0, [], [0xfffffffffffffffb, 0x7fffffff, 0x6, 0x2]}) setxattr$trusted_overlay_redirect(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)='trusted.overlay.redirect\x00', &(0x7f0000000640)='./file0\x00', 0x8, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000165", 0x24) 16:39:55 executing program 0: pipe(0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 16:39:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:55 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000240)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000580)) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000540)='\x00\x00\x06\x00\x00', &(0x7f0000000800)={'syz'}, &(0x7f00000006c0)='\xd8sR\xa1E5\x90\xdf}\xab&\x05\xb9\x96\xe5v\x1f\'\xb8~\xb2B\xbb(\xdd*\xc1\xbd\xa4w\x8agp\xdd\xa9\xc6\xcb+L\xcfP\xf9\xb5m\xab\xe7\x92\xfd\x9a<\x8a\x14\xc59\x9d\xe4\x15\xce\xf5\xb2\xe0;\n\xc6\x1a\xb6\xd9S\xed88\xca\xe9', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000180)={{0xfffffffffffff001}, 'port1\x00', 0x84, 0x0, 0x8, 0x1e76, 0x6, 0x0, 0x7fffffff}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$nbd(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="c4"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4ab677f308001d2f2d383a0a90e753986c90f5a4da53c0b371327a764125133716cec7790988f918728e5d5b8e355497919968a1c7572907b4778e3656bb462785c34ffc31163aa100000000000000", @ANYBLOB], 0x2}}, 0x0) setfsgid(0x0) sendmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x40, 0x301000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x20) 16:39:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x8dc}, 0x28) 16:39:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x17, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:55 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) 16:39:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000158", 0x24) 16:39:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0xfffffd47, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x101, &(0x7f0000000040)=0x0) io_getevents(r1, 0x6, 0x4, &(0x7f00000000c0)=[{}, {}, {}, {}], &(0x7f0000000140)={0x0, 0x1c9c380}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0xfffffffffffffe7e) [ 254.846044][T18020] ptrace attach of "/root/syz-executor.0"[10116] was attempted by "/root/syz-executor.0"[18020] 16:39:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x17, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x8dc}, 0x28) 16:39:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'erspan0\x00', 0x0}) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000100)=0x20, 0x4) sendmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000000040)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}], 0x400000000000084, 0x0) 16:39:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x17, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000147", 0x24) 16:39:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x136, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500009b322f3798bb7bac7200000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efab"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x8dc}, 0x28) 16:39:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x389, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c325274770e25a3e9bfd1586e13cde58b6a46c611c2e2d563257ac094419dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1}, 0x46) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x22e, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1}, 0x0) recvfrom$inet(r4, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000240)=[{&(0x7f0000000280)=""/67, 0x3e}], 0x1) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r7, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) recvmsg(r6, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000500)=""/197, 0xc5}, {0x0}], 0x2}, 0x0) shutdown(r7, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 16:39:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000148", 0x24) 16:39:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000000c0)={[{0x4, 0x4, 0x1208000000, 0x6, 0x7, 0x1d83, 0x8, 0x4, 0x5, 0x20f, 0x7f, 0x1, 0x9}, {0x0, 0x8, 0x6, 0x5, 0x0, 0x6a, 0x1, 0x7fff, 0x1f, 0x96, 0x9, 0x5}, {0x2, 0x4, 0x7ff, 0x7, 0x0, 0xfffffffffffffffd, 0x2, 0x9f92, 0x5, 0x0, 0xffffffffffffff21, 0x5, 0x6}], 0x9}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x140) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x69f5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0x1, 0x10}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x7, 0x0, &(0x7f0000000080)="52d3814e7fffff", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x4e24, @multicast1}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x4, 0x5, [0x80000001, 0xb30, 0x3ff, 0x1, 0x7]}, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffabc76405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 16:39:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x7, 0x0, &(0x7f0000000080)="52d3814e7fffff", 0x0, 0x8dc}, 0x28) 16:39:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x3a1, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 16:39:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x7, 0x0, &(0x7f0000000080)="52d3814e7fffff", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = dup3(r1, r0, 0xd504c960b3e671f0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000000c0)={{0x0, 0xffff}, {0x7fff, 0x3}, 0x5, 0x2, 0x38d3}) 16:39:57 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f00000000c0)=""/79) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000380)={0x79, 0x0, [0x7fffffff, 0x7, 0x4, 0x1]}) 16:39:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xb, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000001200000000000095000000000000004e628fb506e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d0000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x6ae5e5303cc000, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = socket$inet(0x2, 0x1, 0x3) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'vxcan1\x00', 0x4}, 0x18) fcntl$setsig(r1, 0xa, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0xbcf, &(0x7f0000000600)=[{&(0x7f00000006c0)="dc9b879ec1c8468320a93ce9c0d083a1c7480fce92f515371522d62c5e", 0x1d, 0x9}, {&(0x7f0000000380)="8d849d6ac8272a6b2fe29a598c03c3569afd93b1b4006b17e0f8134e45e4369ddc22695b94e035801f93e29fda6a7c26edf1684e3003765cc1a7df04dfc6c7f357fa298ecf9786d40d3c9ef790dfecedf95332f703e4233030f3e3eedd3ea4f65db0a847085f31b5d47dce751c3041f69bb823f391d3be9c064339a5b1516021ff9eae4e7ce7c6d2bfab46129db121d987be2dd3977ceca64da47114106eebdece68f6c40f77b620301987fbae317fe4787f5e6a83d393faa8cda3fa9eef8e3454339c", 0xc3, 0xfffffffffffffff9}, {&(0x7f0000000480)="45b94c1babb57b69bfb99f2e434b8856a334c1ff9c27f5cddf787eb180ab5f41af6bc34300e087589e9763b8f1a646b0fc949fe371a7994abf8b1662b8614b2c7ce1e146e7ecc7f7053f5656788d1e9dfd49f94b9438acdc3237eb387216e7d3c9dce6349ee9005281afec40b9713917e5223e19586820f353f21eb8e458ccc7ab330ee40753b05b2fd28314f00ac0ffcde7a1ade94fb7f1f8638881f09799adae31de621d576124834d8e04376711b1f0ede1292742890ba1bbdaedf636161c73f1b051e48fcde065e033be7e889164591b0c7abc1f3a1d", 0xd8, 0x8}, {&(0x7f0000000140)="ff40841dcb5559fe975eb61484e96e40", 0x10, 0x200}, {&(0x7f0000000580)="5a96a817dbf35548d84f4a82f500c5732eee99ef54f9195e1267341ebf2dbbbae1fc81906b1b6e1b982d55e524232a9ca3b32dd9ea93c3af4318789c721f1abb01d63b8db4fe73185c", 0x49, 0x6}], 0x1000000, &(0x7f0000000680)='syzkaller\x00') 16:39:57 executing program 0: bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) r1 = syz_open_dev$swradio(0x0, 0x1, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$TIOCEXCL(r1, 0x540c) sendmsg$rds(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/54, 0x36}, {&(0x7f0000001140)=""/111, 0x6f}, {&(0x7f00000011c0)=""/123, 0x7b}, {&(0x7f0000001240)=""/131, 0x83}, {&(0x7f0000001300)=""/29, 0x1d}], 0x6, &(0x7f0000001500)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000013c0)=""/76, 0x4c}, &(0x7f0000001440)}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x999}], 0x48, 0x4040040}, 0x40884) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0) 16:39:57 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x1, 0x5}) 16:39:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xb, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xb, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48", 0x0, 0x8dc}, 0x28) 16:39:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200006a9175c980db02a6e74f54ed028c000019ae5fda0000000000000703000000feffff7a0af0fff8ffbfff79a4f0ff00000000b7060000ffffffff3d6405000000000065040000010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81738d6f1ebb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) gettid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) gettid() getpgrp(0x0) getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) getpgid(0x0) fcntl$getown(r1, 0x9) r2 = getpgid(0x0) r3 = getpgid(r2) getpgrp(r3) get_robust_list(r3, &(0x7f0000000100)=&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f0000000140)=0x18) r4 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_netdev_private(r4, 0x89f2, &(0x7f0000000480)="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") r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000001480)=0x2947eb05, 0x4) gettid() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d640500000000000404fb39b8a4a8dfb8000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14f0000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)="8f6e", 0x2, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) 16:39:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xd, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff0", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) dup(r0) 16:39:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x20, 0x70b18906927daa48) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000280)) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f05e00000000b7060000ffffffff3d640500000000006504040001000000040300000000000000050000000000007a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d3e4ac4bd9cbb0ecc49bd5c3252747764a0a3e9bf0502459fbed1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc995e0f00009d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xd, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff0", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, 0xfffffffffffffffd, 0x0) getgroups(0xfffffffffffffc7e, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000000085000000120e2700b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$TIOCCONS(r2, 0x541d) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000380)={0x1}) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000140)=0x7, 0x4) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000003c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xd, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff0", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00bc6753b2de000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) preadv(r0, &(0x7f0000000480)=[{0x0, 0xe000}, {&(0x7f0000000040)=""/136, 0x88}], 0x2, 0x0) 16:39:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0}, 0x28) 16:39:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff000000db3b060000ffffffff3d64050000005297478200a45d3110e1bf000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000e94e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c1c6e04e470af5c1d595f0c55765728bd3252747764a0a3e9d6d1586e13cde58b6a46c611c2e2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) sched_getparam(r1, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r3}, &(0x7f0000000400)=0x8) 16:39:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0xffffffffffffff70, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xdeb, 0x10000) r2 = getpid() r3 = fcntl$getown(r0, 0x9) sendmsg$nl_netfilter(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x28, 0xe, 0x5, 0x301, 0x70bd26, 0x25dfdbfd, {0xf, 0x0, 0x9}, [@nested={0x14, 0x53, [@typed={0x8, 0x1c, @pid=r2}, @typed={0x8, 0x14, @pid=r3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xfffffffffffffec1}, 0x48) syz_open_dev$swradio(&(0x7f0000000400)='/dev/swradio#\x00', 0x0, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0xffffffffffffff9a, 0x0, &(0x7f0000000040)="74c2000000000000000014f8593be72e331157118cbbf370960000000149953169172da9cccec2e0", 0x0, 0x8dc}, 0xfffffffffffffe01) 16:39:58 executing program 0: io_setup(0x400, &(0x7f0000000100)=0x0) io_cancel(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8ee434db8c3207e}, 0x0) 16:39:58 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0}, 0x28) 16:39:58 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 1: r0 = semget$private(0x0, 0x2, 0x445267dfe4840f56) semctl$GETNCNT(r0, 0x1, 0xe, &(0x7f0000000040)=""/44) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d64050000007f0000000400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:58 executing program 4: socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 0: clone(0x41fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000240)) ptrace(0x10, r0) ptrace$getregs(0x3, r0, 0xfffffffffffffffe, 0x0) 16:39:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0}, 0x28) 16:39:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x3a3, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x40) bind$llc(r1, &(0x7f00000000c0)={0x1a, 0x10f, 0xff, 0x8a21, 0xf6, 0x7fffffff}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fec4e07a0af0fff8ffffff79a4f0ff00000000b7ffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012001300b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c0000000039df705edf2f55efabd14fdc99a86ead4e9d416ea0c661dc5c63f7a5deee01d965d71aea9b4ad3326f23cc51cc976fd9361751f6392c1dc38e63893da2a21d337e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f0000000140)={'batadv0\x00'}) 16:39:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:59 executing program 2: socketpair(0x10, 0x3, 0x0, &(0x7f0000000080)) 16:39:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000000c0)=0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") getresgid(&(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB=',barrier,sessi']) 16:39:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:39:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:39:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x100, 0x101000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x3, 0x1, 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) getgroups(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) mount$9p_virtio(&(0x7f0000000140)='&\'\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)={'trans=virtio,', {[{@privport='privport'}, {@mmap='mmap'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'em1trusted!user@['}}, {@appraise='appraise'}, {@appraise='appraise'}]}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:39:59 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:40:00 executing program 1: r0 = memfd_create(&(0x7f0000000100)='keyring]-selinux,\x00', 0x5) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)={0x0, @aes256}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xfffffffffffffd20, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x17a) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 16:40:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:40:00 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000840)={@dev, @remote, 0x0}, &(0x7f0000000900)=0xc) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000940)={0x1d, r0}, 0x10, &(0x7f0000000a80)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000640)={0x0, 0xc70}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980)={0x1, 0x4, 0x8, 0xe22}, &(0x7f00000009c0)=0x10) bind$rds(r1, &(0x7f0000000180)={0x2, 0xffffffffffffffff, @loopback}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) [ 258.896913][T18360] hfsplus: unable to parse mount options 16:40:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x20000000000002f9, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xffffffffffffff05}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) [ 259.067673][T18382] rdma_op 0000000045780624 conn xmit_rdma 000000006ebc46d6 16:40:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:40:00 executing program 2: r0 = syz_open_dev$mice(0x0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000840)={@dev, @remote, 0x0}, &(0x7f0000000900)=0xc) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000940)={0x1d, r1}, 0x10, &(0x7f0000000a80)={&(0x7f0000000a00)={0x5, 0x1, 0x0, {0x77359400}, {0x77359400}, {0x0, 0x0, 0xffffffff, 0x2}, 0x1, @can={{0x0, 0x9, 0xd891, 0x51c}, 0x0, 0x2, 0x0, 0x0, "2f776d8ffd71e2cd"}}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$FUSE_ATTR(r0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000640)={0x0, 0xc70}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000800)={r3, 0x3, 0x4, [0x40, 0xac6f, 0x3f, 0x401]}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980)={0x1, 0x4, 0x8, 0xe22}, &(0x7f00000009c0)=0x10) bind$rds(r2, &(0x7f0000000180)={0x2, 0xffffffffffffffff, @loopback}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 16:40:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xf3, 0x40) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f00000000c0)={0x4, 0x9000, 0x8000000, 0xfffffffffffffff7, 0x4}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000100)={{0x6, 0x5, 0x9, 0x8001, 0x200, 0xf4a}, 0x51, 0x4, 0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x6, 0x7, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0xfffffffffffffcca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:40:00 executing program 0: r0 = syz_open_dev$mice(0x0, 0x0, 0x401) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000840)={@dev, @remote, 0x0}, &(0x7f0000000900)=0xc) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000940)={0x1d, r1}, 0x10, &(0x7f0000000a80)={&(0x7f0000000a00)={0x5, 0x1, 0x0, {0x77359400}, {0x77359400}, {0x0, 0x0, 0xffffffff, 0x2}, 0x1, @can={{0x0, 0x0, 0xd891, 0x51c}, 0x0, 0x2, 0x0, 0x0, "2f776d8ffd71e2cd"}}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$FUSE_ATTR(r0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000640)={0x0, 0xc70}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000800)={r3, 0x3, 0x4, [0x40, 0xac6f, 0x3f, 0x401]}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980)={0x1, 0x4, 0x8, 0xe22}, &(0x7f00000009c0)=0x10) bind$rds(r2, &(0x7f0000000180)={0x2, 0xffffffffffffffff, @loopback}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) [ 259.199374][T18396] rdma_op 00000000b1577310 conn xmit_rdma 000000006ebc46d6 16:40:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:40:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:40:00 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000001600)={@empty, @local, 0x0}, &(0x7f0000001640)=0xc) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x400002, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000440)=0x422, &(0x7f0000000480)=0x2) sendmsg$nl_route_sched(r1, &(0x7f0000001980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001940)={&(0x7f0000001680)=@newtaction={0x2b0, 0x30, 0x2, 0x70bd2b, 0x25dfdbff, {}, [{0x60, 0x1, @m_nat={0x5c, 0x1c, {{0x8, 0x1, 'nat\x00'}, {0x2c, 0x2, @TCA_NAT_PARMS={0x28, 0x1, {{0x20, 0xffffffffffff8001, 0x8, 0x8, 0x5d}, @broadcast, @multicast2, 0xffffff00}}}, {0x20, 0x6, "8c94251a8bf87ca3a40f18c7050202419deed9d5af746e1f0f"}}}}, {0x48, 0x1, @m_ipt={0x44, 0xc, {{0x8, 0x1, 'ipt\x00'}, {0x24, 0x2, [@TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x7c6391b3ecf98cfc}, @TCA_IPT_INDEX={0x8, 0x3, 0x80000001}, @TCA_IPT_INDEX={0x8, 0x3, 0x2}]}, {0x10, 0x6, "3b2da52133c3d557679885"}}}}, {0x154, 0x1, @m_gact={0x150, 0x10, {{0xc, 0x1, 'gact\x00'}, {0x40, 0x2, [@TCA_GACT_PROB={0xc, 0x3, {0x3, 0xdec, 0x10000000}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1a6, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x20, 0x3, 0x20000001, 0x9, 0x3}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x240e, 0x1}}]}, {0xfc, 0x6, "1aca4cb1037882be5f97a60050016b752a059315ee5100cc0b5b461947620d0c2c756a39c200a35e541c72ca91378edfe8cae0c12bc1888a5e4dfb8c3c40109148c1ad921a4deffc869e1096742a86fd8ac66257d8de8ce8516d00adceb094b8934a6f6d8ac09b6ae6793531d0570272bbfd28284a1d71e4e7282fcc1e69bda520fade18507e5c6adae6471c1600f077b8dbcbbd36a2d9e8a6580a45e5b50be98ae2e0eebfa5a4c6eaf707c98b314013a4bcc962b1acc9e16a82c7a13a65f056e319dadba615bdd8b29de4ceb96f25fe00341fcd5993cfb9729d7d55937f7f57d767ae32669e4d72f5e40e602d2845b29da4ea84d8"}}}}, {0xa0, 0x1, @m_mirred={0x9c, 0xe, {{0xc, 0x1, 'mirred\x00'}, {0x24, 0x2, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7fff, 0x400, 0x20000000, 0x5, 0x9}, 0x1, r2}}}, {0x64, 0x6, "62e2ab6f30827606dfda8ac9047a177fbb9d456bb3ae7b8b82d6289a5e9179f0f6145ef7f3149a4a96f51e1aafe89a1922a7e2820d9daf1ffc54d4d95ccb6b56aaff842fe72bac39e7d26c113577f2c32c0f6c215ee2e438fd2b25cf5f"}}}}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x851}, 0x41) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x0, 0x2b, 0x83, &(0x7f0000000040)="a5c653e32eb10ae1a5648130ed9f1ee30e08b6218524a3c190b1e4f796d20495b0e2f44165749618dc37ea", &(0x7f00000000c0)=""/131, 0x5a06}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:00 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000840)={@dev, @remote, 0x0}, &(0x7f0000000900)=0xc) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000940)={0x1d, r0}, 0x10, &(0x7f0000000a80)={&(0x7f0000000a00)={0x5, 0x1, 0x0, {0x77359400}, {0x77359400}, {0x0, 0x0, 0xffffffff, 0x2}, 0x1, @can={{0x0, 0x9, 0xd891, 0x51c}, 0x0, 0x2, 0x0, 0x0, "2f776d8ffd71e2cd"}}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000640)={0x0, 0xc70}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)={r2, 0x3, 0x4, [0x40, 0xac6f, 0x3f, 0x401]}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980)={0x1, 0x4, 0x8, 0xe22}, &(0x7f00000009c0)=0x10) bind$rds(r1, &(0x7f0000000180)={0x2, 0xffffffffffffffff, @loopback}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 16:40:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000001ff", 0x24) 16:40:00 executing program 0: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000840)={@dev, @remote, 0x0}, &(0x7f0000000900)=0xc) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000940)={0x1d, r0}, 0x10, &(0x7f0000000a80)={&(0x7f0000000a00)={0x5, 0x1, 0x0, {0x77359400}, {0x77359400}, {0x0, 0x0, 0xffffffff, 0x2}, 0x1, @can={{0x0, 0x9, 0xd891, 0x51c}, 0x0, 0x2, 0x0, 0x0, "2f776d8ffd71e2cd"}}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000640)={0x0, 0xc70}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980)={0x1, 0x4, 0x8, 0xe22}, &(0x7f00000009c0)=0x10) bind$rds(r1, &(0x7f0000000180)={0x2, 0xffffffffffffffff, @loopback}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) [ 259.498816][T18422] rdma_op 00000000571cd356 conn xmit_rdma 000000006ebc46d6 16:40:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d64050000000000650404000100000004a09db89a5809cddf5ac0249c04000001000000b70000850000001200b70000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf00"/174], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000001ff", 0x24) 16:40:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x8}, [@ldst={0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 16:40:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a04fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c35cc9dfa39df705edf2f55efabd14fdc99a86eaf4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10001000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) dup2(r0, r1) 16:40:00 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:40:00 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000480)={r1, r2/1000+10000}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) accept$inet6(r4, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, &(0x7f00000003c0)=0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x1, @local, 0x10000}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e23, 0x31, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x3140000000000000, @dev={0xfe, 0x80, [], 0x27}, 0x3}, @in6={0xa, 0x4e20, 0x100000001, @mcast1, 0x6}, @in={0x2, 0x4e20}], 0xa0) 16:40:00 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) ioctl$TCSETAF(r1, 0x5408, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, 0x0, 0x0) dup3(r3, r2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 16:40:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000001ff", 0x24) 16:40:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@empty, 0x0, 0x0, 0x0, 0xc}, 0x20) 16:40:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="5264744e7cffff3bad6c48eff14c", 0x0, 0x8dc}, 0x28) 16:40:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000001ff", 0x24) 16:40:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x800) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd4, r1, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @remote}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x669e}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x200}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x80}, 0x840) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x15, 0x2238}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x81}}, [0x101, 0x3, 0x2, 0x0, 0x7, 0x1, 0x9, 0x10001, 0x100000000, 0x5, 0x200, 0xee, 0x400, 0x0, 0x100000000]}, &(0x7f0000000300)=0x100) fgetxattr(r0, &(0x7f0000000740)=@known='system.sockprotoname\x00', &(0x7f0000000780)=""/40, 0x28) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000840)={0x5de, 0x3, 0x8}) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000480)=""/114, &(0x7f0000000500)=0x72) bind$netrom(r0, &(0x7f00000007c0)={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) sched_yield() getresuid(&(0x7f0000000940), &(0x7f0000000980)=0x0, &(0x7f00000009c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000bc0)=0xe8) mount$fuseblk(&(0x7f0000000880)='/dev/loop0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='fuseblk\x00', 0x200000, &(0x7f0000000c00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0x7}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}], [{@fowner_lt={'fowner<', r6}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, 'ppp0'}}, {@appraise_type='appraise_type=imasig'}, {@audit='audit'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@permit_directio='permit_directio'}]}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) ioctl$RTC_UIE_ON(r0, 0x7003) 16:40:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dc}, 0x28) [ 260.057945][T18483] net_ratelimit: 2 callbacks suppressed [ 260.057952][T18483] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 16:40:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) sendto$inet(r0, &(0x7f0000000000), 0x8afb8915, 0xc0, 0x0, 0x0) 16:40:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000188", 0x24) 16:40:01 executing program 1: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000100)={0x80, 0x41, &(0x7f00000000c0)="722a711680cf8f48c1e12443a20d864948e771a80a8c2d376ef8a1c0fcfccca61ad8342eba9c322189a91c848310e369d1e53b075951", {0x2, 0x5, 0x32314d56, 0x6, 0x3, 0x5, 0x0, 0x5}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30054c034d7930116b50000feffff7a0af0fff8ffffff39a4f0ff00ffffff3d4c05000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628db5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x10}) 16:40:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dc}, 0x28) 16:40:05 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080016000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 16:40:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x1d7d6ec0, 0x6e78, 0x19, 0x0, 0x0, 0x6, 0x40, 0x4, 0x2, 0x2d41, 0x200, 0x2, 0x0, 0x0, 0x1ff, 0x8a9, 0x8, 0x5, 0x9, 0x947, 0x1, 0xffffffff80000001, 0xa451, 0x9, 0x6, 0x5, 0x51e, 0x81, 0x30c, 0x10001, 0x8001, 0x7ff, 0x8, 0x0, 0x1, 0xffffffff, 0x0, 0x9, 0xa69306e151dcdd90, @perf_bp={&(0x7f00000000c0), 0x130927223dbc39c9}, 0x3f95c332c425a225, 0x7, 0x4, 0x7, 0x7, 0x401, 0x20}, 0xffffffffffffffff, 0x6, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) 16:40:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb080001000000019e", 0x24) 16:40:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dc}, 0x28) 16:40:05 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x896f) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x13c, r1, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x976}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x21}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x960}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}]}, @TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x10a) 16:40:05 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0f0140687402000071000000000000ce66d035098bcf52d38807b4b3bbcef600000000000000000000000000000000009e6261bdedf9a1f569000100000000000052f2b98878e70ee76f7a823241f3dd517b31f308f3695fd332edddd122e0dbe4d0b69758ab17c016438fc23dbd40e0b0887952257e13cee66a7388857e1ddbaa0f6776e2ed9ad62eb02037f4800c5ed103d9d79b936100000000000000000000000000000000000000000000000000003ba072a2b6c2c7503b3b"], 0xbb) sendto$inet(r0, &(0x7f0000000000), 0x8afb8915, 0xc0, 0x0, 0x0) 16:40:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x8dc}, 0x28) 16:40:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000001ef", 0x24) 16:40:06 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(r2, 0x4, 0x42c00) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 16:40:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000002b80)=0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xfd5d, 0x0, 0x0, 0x0, [], r2, 0x1, r0, 0x8, &(0x7f0000000000), 0x6, 0x10, &(0x7f0000000000), 0x10}, 0x70) r4 = gettid() process_vm_readv(r4, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/39, 0x27}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/102, 0x66}, {&(0x7f0000001400)=""/243, 0xf3}], 0x4, &(0x7f0000002ac0)=[{&(0x7f0000001500)=""/89, 0x59}, {&(0x7f0000001580)=""/22, 0x16}, {&(0x7f00000015c0)=""/154, 0x9a}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/20, 0x14}, {&(0x7f00000026c0)=""/238, 0xee}, {&(0x7f00000027c0)=""/190, 0xbe}, {&(0x7f0000002880)=""/204, 0xcc}, {&(0x7f0000002980)=""/114, 0x72}, {&(0x7f0000002a00)=""/188, 0xbc}], 0xa, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 16:40:06 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080006000400ff7e", 0x24}], 0x1}, 0x0) 16:40:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb08000100000001f0", 0x24) 16:40:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) sysfs$3(0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0abd00fe000000008500000012000000000000000000000095000000000000004e628fb5a4e47f6ce4c59d8134dec4bd9cbb0ecc49bd5c3252747764a0a3e9b7d1586e13cde58b6a46c611c2e2d57625292c28cc9dfa39df705edf2f55efabd14fdc99a86ead"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xf5, 0x0, &(0x7f00000003c0)="52d3814e7fffff3bad6c48eff04cbacb62cd02f21d49405ecf74cc671d1b217c4788025fdf8f8b89b90dadaa9d858403065a1e384448db932e27c7fe22a9028cd5bebdd133a324dae49f77ffb92e7b82fbd172a553f013aa1348ea8218c2d9019042627c873bf73afa195473d309f811a4804940c77903805f0bc6acd5b5dca0fafc8531a625873d6054e302c1ea0041a4b287c03c42692c3d9500fb2b44fa1e1b9d20cd7696cf8189d3a5e8dcf93ce201766ffef17eba4f7e10bfeac7a51832794cddbeb0b0400eb5bfa7347fb2b080238cf0b60f5979af1a6484098df6ef2462e567e1ab84e292c96c9f18000000000000000000", 0x0, 0x8dc}, 0xffffffffffffffb3) 16:40:06 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080008000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 16:40:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000000c0)=0x3) 16:40:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5c0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55a0ae3db8c603d16a5c9ad9944eb12a29efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x8dc}, 0x28) 16:40:06 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800010000000100", 0x24) 16:40:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0xffffffbc, 0x10, 0x8}, [@ldst={0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) [ 265.200698][T18564] __nla_validate_parse: 4 callbacks suppressed [ 265.200716][T18564] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 16:40:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b705000000001b006a0a00fe000000008500000012000000b70000000000000095000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa39df705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x400000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7ff, 0x208000) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x30, r0, 0x80000000) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000080)={0x80000000, 0x5, 0x3f, 0x20, 0xddbd, 0x8, 0x8}) [ 265.294620][T10122] WARNING: CPU: 1 PID: 10122 at kernel/bpf/core.c:851 bpf_jit_free+0x1a8/0x1f0 [ 265.303827][T10122] Kernel panic - not syncing: panic_on_warn set ... [ 265.310423][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 265.318160][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.328416][T10122] Workqueue: events bpf_prog_free_deferred [ 265.334568][T10122] Call Trace: [ 265.338107][T10122] dump_stack+0x1d8/0x2f8 [ 265.342961][T10122] panic+0x25c/0x799 [ 265.347814][T10122] ? __warn+0x126/0x230 [ 265.352256][T10122] __warn+0x22f/0x230 [ 265.356237][T10122] ? bpf_jit_free+0x1a8/0x1f0 [ 265.362168][T10122] report_bug+0x190/0x290 [ 265.366616][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 265.374322][T10122] #PF: supervisor read access in kernel mode [ 265.380312][T10122] #PF: error_code(0x0000) - not-present page [ 265.386343][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 265.394154][T10122] Oops: 0000 [#1] PREEMPT SMP KASAN [ 265.399374][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 265.407191][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.417360][T10122] Workqueue: events bpf_prog_free_deferred [ 265.423177][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 265.429061][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 265.448691][T10122] RSP: 0018:ffff888093907828 EFLAGS: 00010806 [ 265.454752][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 265.462709][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 265.470678][T10122] RBP: ffff888093907860 R08: ffffffff817dc0cb R09: 0000000000000001 [ 265.478735][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 265.486706][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 265.494680][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 265.503602][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.510172][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 265.518587][T10122] Call Trace: [ 265.521886][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 265.529606][T10122] #PF: supervisor read access in kernel mode [ 265.535697][T10122] #PF: error_code(0x0000) - not-present page [ 265.541757][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 265.549308][T10122] Oops: 0000 [#2] PREEMPT SMP KASAN [ 265.554593][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 265.562472][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.572562][T10122] Workqueue: events bpf_prog_free_deferred [ 265.578469][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 265.584369][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 265.603970][T10122] RSP: 0018:ffff888093907450 EFLAGS: 00010806 [ 265.610305][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 265.619602][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 265.627697][T10122] RBP: ffff888093907488 R08: ffffffff817dc0cb R09: 0000000000000001 [ 265.635760][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 265.644005][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 265.661620][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 265.670807][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.677379][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 265.685510][T10122] Call Trace: [ 265.689001][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 265.696885][T10122] #PF: supervisor read access in kernel mode [ 265.702983][T10122] #PF: error_code(0x0000) - not-present page [ 265.709121][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 265.716922][T10122] Oops: 0000 [#3] PREEMPT SMP KASAN [ 265.722136][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 265.729857][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.740027][T10122] Workqueue: events bpf_prog_free_deferred [ 265.746097][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 265.752070][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 265.772534][T10122] RSP: 0018:ffff888093907080 EFLAGS: 00010806 [ 265.778628][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 265.786617][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 265.794693][T10122] RBP: ffff8880939070b8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 265.803214][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 265.811568][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 265.820404][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 265.829765][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.836729][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 265.844789][T10122] Call Trace: [ 265.848196][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 265.855899][T10122] #PF: supervisor read access in kernel mode [ 265.861961][T10122] #PF: error_code(0x0000) - not-present page [ 265.867930][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 265.875849][T10122] Oops: 0000 [#4] PREEMPT SMP KASAN [ 265.881468][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 265.889621][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.899895][T10122] Workqueue: events bpf_prog_free_deferred [ 265.905876][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 265.911962][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 265.932172][T10122] RSP: 0018:ffff888093906cb0 EFLAGS: 00010806 [ 265.938538][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 265.948297][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 265.957696][T10122] RBP: ffff888093906ce8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 265.965986][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 265.973983][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 265.982055][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 265.991090][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.997690][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 266.005754][T10122] Call Trace: [ 266.009427][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 266.017224][T10122] #PF: supervisor read access in kernel mode [ 266.023296][T10122] #PF: error_code(0x0000) - not-present page [ 266.029364][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 266.036920][T10122] Oops: 0000 [#5] PREEMPT SMP KASAN [ 266.042191][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 266.049899][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.059972][T10122] Workqueue: events bpf_prog_free_deferred [ 266.066225][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 266.072315][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 266.092199][T10122] RSP: 0018:ffff8880939068e0 EFLAGS: 00010806 [ 266.098274][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 266.106248][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 266.114235][T10122] RBP: ffff888093906918 R08: ffffffff817dc0cb R09: 0000000000000001 [ 266.122196][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 266.130168][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 266.138709][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 266.147751][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.154686][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 266.163339][T10122] Call Trace: [ 266.166769][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 266.174489][T10122] #PF: supervisor read access in kernel mode [ 266.180806][T10122] #PF: error_code(0x0000) - not-present page [ 266.186854][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 266.194674][T10122] Oops: 0000 [#6] PREEMPT SMP KASAN [ 266.199947][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 266.207750][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.217806][T10122] Workqueue: events bpf_prog_free_deferred [ 266.223613][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 266.229504][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 266.249280][T10122] RSP: 0018:ffff888093906510 EFLAGS: 00010806 [ 266.255355][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 266.263409][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 266.271548][T10122] RBP: ffff888093906548 R08: ffffffff817dc0cb R09: 0000000000000001 [ 266.280058][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 266.288053][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 266.296020][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 266.304969][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.311553][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 266.319701][T10122] Call Trace: [ 266.323029][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 266.330730][T10122] #PF: supervisor read access in kernel mode [ 266.336696][T10122] #PF: error_code(0x0000) - not-present page [ 266.342673][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 266.350221][T10122] Oops: 0000 [#7] PREEMPT SMP KASAN [ 266.355423][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 266.363140][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.373196][T10122] Workqueue: events bpf_prog_free_deferred [ 266.379192][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 266.385409][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 266.405722][T10122] RSP: 0018:ffff888093906140 EFLAGS: 00010806 [ 266.411903][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 266.419888][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 266.427952][T10122] RBP: ffff888093906178 R08: ffffffff817dc0cb R09: 0000000000000001 [ 266.436098][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 266.446050][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 266.456967][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 266.470917][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.478280][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 266.486247][T10122] Call Trace: [ 266.489574][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 266.497560][T10122] #PF: supervisor read access in kernel mode [ 266.503614][T10122] #PF: error_code(0x0000) - not-present page [ 266.509599][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 266.517318][T10122] Oops: 0000 [#8] PREEMPT SMP KASAN [ 266.522511][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 266.530228][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.540492][T10122] Workqueue: events bpf_prog_free_deferred [ 266.546302][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 266.552192][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 266.572234][T10122] RSP: 0018:ffff888093905d70 EFLAGS: 00010806 [ 266.578395][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 266.586651][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 266.594622][T10122] RBP: ffff888093905da8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 266.602690][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 266.610665][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 266.618728][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 266.627743][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.634320][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 266.642388][T10122] Call Trace: [ 266.645689][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 266.653479][T10122] #PF: supervisor read access in kernel mode [ 266.659450][T10122] #PF: error_code(0x0000) - not-present page [ 266.665447][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 266.672999][T10122] Oops: 0000 [#9] PREEMPT SMP KASAN [ 266.678201][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 266.686606][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.696771][T10122] Workqueue: events bpf_prog_free_deferred [ 266.702861][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 266.709102][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 266.728805][T10122] RSP: 0018:ffff8880939059a0 EFLAGS: 00010806 [ 266.734986][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 266.743127][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 266.751094][T10122] RBP: ffff8880939059d8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 266.759065][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 266.767158][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 266.775126][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 266.784308][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.790890][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 266.798859][T10122] Call Trace: [ 266.802165][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 266.809867][T10122] #PF: supervisor read access in kernel mode [ 266.815829][T10122] #PF: error_code(0x0000) - not-present page [ 266.821804][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 266.830050][T10122] Oops: 0000 [#10] PREEMPT SMP KASAN [ 266.835355][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 266.843077][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.853156][T10122] Workqueue: events bpf_prog_free_deferred [ 266.859020][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 266.864920][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 266.884674][T10122] RSP: 0018:ffff8880939055d0 EFLAGS: 00010806 [ 266.890755][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 266.898733][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 266.906721][T10122] RBP: ffff888093905608 R08: ffffffff817dc0cb R09: 0000000000000001 [ 266.914881][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 266.922859][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 266.930826][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 266.939776][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.946898][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 266.957137][T10122] Call Trace: [ 266.960498][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 266.968727][T10122] #PF: supervisor read access in kernel mode [ 266.974705][T10122] #PF: error_code(0x0000) - not-present page [ 266.980686][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 266.988424][T10122] Oops: 0000 [#11] PREEMPT SMP KASAN [ 266.993700][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 267.001512][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.011578][T10122] Workqueue: events bpf_prog_free_deferred [ 267.017382][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 267.023362][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 267.043692][T10122] RSP: 0018:ffff888093905200 EFLAGS: 00010806 [ 267.049762][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 267.057735][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 267.065793][T10122] RBP: ffff888093905238 R08: ffffffff817dc0cb R09: 0000000000000001 [ 267.073771][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 267.081885][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 267.089885][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 267.098897][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.105468][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 267.113447][T10122] Call Trace: [ 267.117017][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 267.125763][T10122] #PF: supervisor read access in kernel mode [ 267.131770][T10122] #PF: error_code(0x0000) - not-present page [ 267.137997][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 267.146324][T10122] Oops: 0000 [#12] PREEMPT SMP KASAN [ 267.154223][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 267.164543][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.174802][T10122] Workqueue: events bpf_prog_free_deferred [ 267.180649][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 267.186541][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 267.207299][T10122] RSP: 0018:ffff888093904e30 EFLAGS: 00010806 [ 267.213375][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 267.221456][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 267.229430][T10122] RBP: ffff888093904e68 R08: ffffffff817dc0cb R09: 0000000000000001 [ 267.237412][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 267.247198][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 267.255175][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 267.264181][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.270778][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 267.279296][T10122] Call Trace: [ 267.282613][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 267.290321][T10122] #PF: supervisor read access in kernel mode [ 267.296390][T10122] #PF: error_code(0x0000) - not-present page [ 267.302527][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 267.310446][T10122] Oops: 0000 [#13] PREEMPT SMP KASAN [ 267.316941][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 267.324656][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.334723][T10122] Workqueue: events bpf_prog_free_deferred [ 267.340544][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 267.346722][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 267.366499][T10122] RSP: 0018:ffff888093904a60 EFLAGS: 00010806 [ 267.372762][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 267.380820][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 267.389414][T10122] RBP: ffff888093904a98 R08: ffffffff817dc0cb R09: 0000000000000001 [ 267.397386][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 267.405355][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 267.413495][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 267.422422][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.429082][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 267.437414][T10122] Call Trace: [ 267.441082][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 267.451001][T10122] #PF: supervisor read access in kernel mode [ 267.457061][T10122] #PF: error_code(0x0000) - not-present page [ 267.463203][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 267.470756][T10122] Oops: 0000 [#14] PREEMPT SMP KASAN [ 267.476031][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 267.483821][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.493990][T10122] Workqueue: events bpf_prog_free_deferred [ 267.499968][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 267.505868][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 267.525565][T10122] RSP: 0018:ffff888093904690 EFLAGS: 00010806 [ 267.531624][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 267.539735][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 267.547717][T10122] RBP: ffff8880939046c8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 267.556798][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 267.565435][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 267.573404][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 267.582496][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.589178][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 267.597167][T10122] Call Trace: [ 267.600474][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 267.608185][T10122] #PF: supervisor read access in kernel mode [ 267.614165][T10122] #PF: error_code(0x0000) - not-present page [ 267.620224][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 267.628480][T10122] Oops: 0000 [#15] PREEMPT SMP KASAN [ 267.633943][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 267.641692][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.654137][T10122] Workqueue: events bpf_prog_free_deferred [ 267.660684][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 267.666582][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 267.686647][T10122] RSP: 0018:ffff8880939042c0 EFLAGS: 00010806 [ 267.692735][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 267.700759][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 267.708731][T10122] RBP: ffff8880939042f8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 267.716708][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 267.724951][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 267.733730][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 267.742653][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.749228][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 267.757212][T10122] Call Trace: [ 267.760527][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 267.769112][T10122] #PF: supervisor read access in kernel mode [ 267.775094][T10122] #PF: error_code(0x0000) - not-present page [ 267.781321][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 267.789327][T10122] Oops: 0000 [#16] PREEMPT SMP KASAN [ 267.794617][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 267.802336][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.812494][T10122] Workqueue: events bpf_prog_free_deferred [ 267.818387][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 267.824275][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 267.843980][T10122] RSP: 0018:ffff888093903ef0 EFLAGS: 00010806 [ 267.850045][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 267.858032][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 267.866027][T10122] RBP: ffff888093903f28 R08: ffffffff817dc0cb R09: 0000000000000001 [ 267.873993][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 267.881962][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 267.889922][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 267.898925][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.905614][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 267.913586][T10122] Call Trace: [ 267.916900][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 267.924700][T10122] #PF: supervisor read access in kernel mode [ 267.930858][T10122] #PF: error_code(0x0000) - not-present page [ 267.936952][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 267.944599][T10122] Oops: 0000 [#17] PREEMPT SMP KASAN [ 267.949993][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 267.958242][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.968523][T10122] Workqueue: events bpf_prog_free_deferred [ 267.974347][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 267.980244][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 267.999980][T10122] RSP: 0018:ffff888093903b20 EFLAGS: 00010806 [ 268.006054][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 268.014020][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 268.021992][T10122] RBP: ffff888093903b58 R08: ffffffff817dc0cb R09: 0000000000000001 [ 268.029953][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 268.038022][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 268.046007][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 268.054937][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 268.061664][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 268.069632][T10122] Call Trace: [ 268.072970][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 268.081113][T10122] #PF: supervisor read access in kernel mode [ 268.087191][T10122] #PF: error_code(0x0000) - not-present page [ 268.093248][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 268.100805][T10122] Oops: 0000 [#18] PREEMPT SMP KASAN [ 268.106107][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 268.113902][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.124326][T10122] Workqueue: events bpf_prog_free_deferred [ 268.130146][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 268.136051][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 268.155784][T10122] RSP: 0018:ffff888093903750 EFLAGS: 00010806 [ 268.161897][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 268.169956][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 268.177934][T10122] RBP: ffff888093903788 R08: ffffffff817dc0cb R09: 0000000000000001 [ 268.186009][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 268.194001][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 268.201971][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 268.210892][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 268.217935][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 268.226263][T10122] Call Trace: [ 268.229577][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 268.237300][T10122] #PF: supervisor read access in kernel mode [ 268.243294][T10122] #PF: error_code(0x0000) - not-present page [ 268.249268][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 268.256923][T10122] Oops: 0000 [#19] PREEMPT SMP KASAN [ 268.262214][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 268.269934][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.280080][T10122] Workqueue: events bpf_prog_free_deferred [ 268.285980][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 268.291896][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 268.311524][T10122] RSP: 0018:ffff888093903380 EFLAGS: 00010806 [ 268.317586][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 268.325899][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 268.333970][T10122] RBP: ffff8880939033b8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 268.342023][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 268.349998][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 268.358327][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 268.367358][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 268.374027][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 268.382011][T10122] Call Trace: [ 268.385554][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 268.393258][T10122] #PF: supervisor read access in kernel mode [ 268.399322][T10122] #PF: error_code(0x0000) - not-present page [ 268.405307][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 268.412890][T10122] Oops: 0000 [#20] PREEMPT SMP KASAN [ 268.418687][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 268.426386][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.436473][T10122] Workqueue: events bpf_prog_free_deferred [ 268.442295][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 268.448206][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 268.467826][T10122] RSP: 0018:ffff888093902fb0 EFLAGS: 00010806 [ 268.473975][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 268.481936][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 268.489901][T10122] RBP: ffff888093902fe8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 268.497892][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 268.505860][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 268.513928][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 268.522954][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 268.529609][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 268.537586][T10122] Call Trace: [ 268.540887][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 268.548769][T10122] #PF: supervisor read access in kernel mode [ 268.555022][T10122] #PF: error_code(0x0000) - not-present page [ 268.561069][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 268.568713][T10122] Oops: 0000 [#21] PREEMPT SMP KASAN [ 268.574011][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 268.581722][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.591790][T10122] Workqueue: events bpf_prog_free_deferred [ 268.597602][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 268.603510][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 268.623118][T10122] RSP: 0018:ffff888093902be0 EFLAGS: 00010806 [ 268.629201][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 268.637420][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 268.645392][T10122] RBP: ffff888093902c18 R08: ffffffff817dc0cb R09: 0000000000000001 [ 268.653404][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 268.661375][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 268.669437][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 268.678357][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 268.685017][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 268.693078][T10122] Call Trace: [ 268.696382][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 268.704276][T10122] #PF: supervisor read access in kernel mode [ 268.710250][T10122] #PF: error_code(0x0000) - not-present page [ 268.716399][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 268.724130][T10122] Oops: 0000 [#22] PREEMPT SMP KASAN [ 268.729607][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 268.737535][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.747615][T10122] Workqueue: events bpf_prog_free_deferred [ 268.753770][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 268.759666][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 268.779291][T10122] RSP: 0018:ffff888093902810 EFLAGS: 00010806 [ 268.785456][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 268.793455][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 268.801605][T10122] RBP: ffff888093902848 R08: ffffffff817dc0cb R09: 0000000000000001 [ 268.809971][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 268.818144][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 268.826386][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 268.837251][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 268.844194][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 268.852506][T10122] Call Trace: [ 268.856191][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 268.863909][T10122] #PF: supervisor read access in kernel mode [ 268.869989][T10122] #PF: error_code(0x0000) - not-present page [ 268.875970][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 268.883866][T10122] Oops: 0000 [#23] PREEMPT SMP KASAN [ 268.890052][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 268.897841][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.907909][T10122] Workqueue: events bpf_prog_free_deferred [ 268.913720][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 268.919613][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 268.939911][T10122] RSP: 0018:ffff888093902440 EFLAGS: 00010806 [ 268.946064][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 268.954487][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 268.966212][T10122] RBP: ffff888093902478 R08: ffffffff817dc0cb R09: 0000000000000001 [ 268.974196][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 268.982608][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 268.990596][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 268.999621][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.006463][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 269.014538][T10122] Call Trace: [ 269.017839][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 269.025634][T10122] #PF: supervisor read access in kernel mode [ 269.031700][T10122] #PF: error_code(0x0000) - not-present page [ 269.037668][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 269.045334][T10122] Oops: 0000 [#24] PREEMPT SMP KASAN [ 269.050611][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 269.058340][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.068493][T10122] Workqueue: events bpf_prog_free_deferred [ 269.074318][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 269.080222][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 269.099842][T10122] RSP: 0018:ffff888093902070 EFLAGS: 00010806 [ 269.105935][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 269.113900][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 269.121875][T10122] RBP: ffff8880939020a8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 269.129846][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 269.137913][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 269.145883][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 269.154891][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.161468][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 269.169436][T10122] Call Trace: [ 269.172755][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 269.180477][T10122] #PF: supervisor read access in kernel mode [ 269.186460][T10122] #PF: error_code(0x0000) - not-present page [ 269.192549][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 269.200109][T10122] Oops: 0000 [#25] PREEMPT SMP KASAN [ 269.205576][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 269.213629][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.223743][T10122] Workqueue: events bpf_prog_free_deferred [ 269.230270][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 269.237385][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 269.258322][T10122] RSP: 0018:ffff888093901ca0 EFLAGS: 00010806 [ 269.264401][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 269.272490][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 269.280746][T10122] RBP: ffff888093901cd8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 269.288728][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 269.296702][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 269.304847][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 269.313954][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.320714][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 269.328688][T10122] Call Trace: [ 269.332181][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 269.339882][T10122] #PF: supervisor read access in kernel mode [ 269.345854][T10122] #PF: error_code(0x0000) - not-present page [ 269.351819][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 269.359539][T10122] Oops: 0000 [#26] PREEMPT SMP KASAN [ 269.364840][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 269.372566][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.382649][T10122] Workqueue: events bpf_prog_free_deferred [ 269.388466][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 269.394456][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 269.414376][T10122] RSP: 0018:ffff8880939018d0 EFLAGS: 00010806 [ 269.420459][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 269.428421][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 269.436403][T10122] RBP: ffff888093901908 R08: ffffffff817dc0cb R09: 0000000000000001 [ 269.444567][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 269.452664][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 269.460649][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 269.469577][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.476161][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 269.484133][T10122] Call Trace: [ 269.487436][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 269.495143][T10122] #PF: supervisor read access in kernel mode [ 269.501105][T10122] #PF: error_code(0x0000) - not-present page [ 269.507428][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 269.515171][T10122] Oops: 0000 [#27] PREEMPT SMP KASAN [ 269.520893][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 269.528740][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.538893][T10122] Workqueue: events bpf_prog_free_deferred [ 269.544725][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 269.550602][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 269.570308][T10122] RSP: 0018:ffff888093901500 EFLAGS: 00010806 [ 269.576478][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 269.584454][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 269.592435][T10122] RBP: ffff888093901538 R08: ffffffff817dc0cb R09: 0000000000000001 [ 269.600404][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 269.608369][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 269.616337][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 269.625264][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.631970][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 269.640122][T10122] Call Trace: [ 269.643437][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 269.656256][T10122] #PF: supervisor read access in kernel mode [ 269.663929][T10122] #PF: error_code(0x0000) - not-present page [ 269.670346][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 269.678106][T10122] Oops: 0000 [#28] PREEMPT SMP KASAN [ 269.683407][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 269.691120][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.701274][T10122] Workqueue: events bpf_prog_free_deferred [ 269.707110][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 269.713108][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 269.733236][T10122] RSP: 0018:ffff888093901130 EFLAGS: 00010806 [ 269.739400][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 269.748083][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 269.756495][T10122] RBP: ffff888093901168 R08: ffffffff817dc0cb R09: 0000000000000001 [ 269.764471][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 269.773569][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 269.781844][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 269.792348][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.799124][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 269.807134][T10122] Call Trace: [ 269.810464][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 269.818255][T10122] #PF: supervisor read access in kernel mode [ 269.824224][T10122] #PF: error_code(0x0000) - not-present page [ 269.830194][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 269.837831][T10122] Oops: 0000 [#29] PREEMPT SMP KASAN [ 269.843110][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 269.850905][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.860960][T10122] Workqueue: events bpf_prog_free_deferred [ 269.866798][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 269.872682][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 269.892463][T10122] RSP: 0018:ffff888093900d60 EFLAGS: 00010806 [ 269.898532][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 269.906579][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 269.914670][T10122] RBP: ffff888093900d98 R08: ffffffff817dc0cb R09: 0000000000000001 [ 269.922734][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 269.930703][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 269.938677][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 269.947777][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.954808][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 269.963137][T10122] Call Trace: [ 269.966466][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 269.974291][T10122] #PF: supervisor read access in kernel mode [ 269.980280][T10122] #PF: error_code(0x0000) - not-present page [ 269.986252][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 269.994024][T10122] Oops: 0000 [#30] PREEMPT SMP KASAN [ 269.999324][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 270.007035][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.017273][T10122] Workqueue: events bpf_prog_free_deferred [ 270.023091][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 270.029083][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 270.049144][T10122] RSP: 0018:ffff888093900990 EFLAGS: 00010806 [ 270.055220][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 270.063212][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 270.071197][T10122] RBP: ffff8880939009c8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 270.079159][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 270.087298][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 270.095279][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 270.104220][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.110796][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 270.118758][T10122] Call Trace: [ 270.122070][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 270.125428][T10122] ================================================================== [ 270.125431][T10122] BUG: KASAN: slab-out-of-bounds in format_decode+0x52/0x1850 [ 270.125434][T10122] Write of size 8 at addr ffff8880938fff88 by task kworker/1:3/10122 [ 270.125435][T10122] [ 270.125438][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 270.125441][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.125443][T10122] Workqueue: events bpf_prog_free_deferred [ 270.125446][T10122] Call Trace: [ 270.125448][T10122] ? sprintf+0x71/0x90 [ 270.125449][T10122] ? msg_print_text+0x16e/0x4a0 [ 270.125451][T10122] ? __kasan_check_write+0x14/0x20 [ 270.125453][T10122] ? do_raw_spin_lock+0xea/0x2d0 [ 270.125455][T10122] ? console_unlock+0x4e4/0xef0 [ 270.125457][T10122] ? __down_trylock_console_sem+0x180/0x1b0 [ 270.125459][T10122] ? vprintk_emit+0x21c/0x3a0 [ 270.125460][T10122] ? vprintk_emit+0x239/0x3a0 [ 270.125462][T10122] ? vprintk_default+0x28/0x30 [ 270.125464][T10122] ? vprintk_func+0x158/0x170 [ 270.125465][T10122] ? printk+0x62/0x8d [ 270.125467][T10122] ? no_context+0x66d/0xc80 [ 270.125469][T10122] ? no_context+0x6e3/0xc80 [ 270.125471][T10122] ? __bad_area_nosemaphore+0x108/0x470 [ 270.125472][T10122] ? vprintk_emit+0x239/0x3a0 [ 270.125474][T10122] ? bad_area_nosemaphore+0x2d/0x40 [ 270.125476][T10122] ? __do_page_fault+0x1a4/0x1f0 [ 270.125478][T10122] ? do_page_fault+0x99/0xb0 [ 270.125479][T10122] ? page_fault+0x39/0x40 [ 270.125482][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 270.125484][T10122] #PF: supervisor read access in kernel mode [ 270.125486][T10122] #PF: error_code(0x0000) - not-present page [ 270.125498][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 270.125507][T10122] Thread overran stack, or stack corrupted [ 270.125509][T10122] Oops: 0000 [#31] PREEMPT SMP KASAN [ 270.125511][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 270.125514][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.125516][T10122] Workqueue: events bpf_prog_free_deferred [ 270.125519][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 270.125524][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 270.125525][T10122] RSP: 0018:ffff8880938ffc28 EFLAGS: 00010806 [ 270.125529][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 270.125532][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 270.125534][T10122] RBP: ffff8880938ffc60 R08: ffffffff817dc0cb R09: 0000000000000001 [ 270.125536][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 270.125539][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 270.125541][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 270.125543][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.125546][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 270.125547][T10122] Call Trace: [ 270.125549][T10122] ? sprintf+0x71/0x90 [ 270.125550][T10122] ? msg_print_text+0x16e/0x4a0 [ 270.125552][T10122] ? __kasan_check_write+0x14/0x20 [ 270.125554][T10122] ? do_raw_spin_lock+0xea/0x2d0 [ 270.125556][T10122] ? console_unlock+0x4e4/0xef0 [ 270.125558][T10122] ? __down_trylock_console_sem+0x180/0x1b0 [ 270.125559][T10122] ? vprintk_emit+0x21c/0x3a0 [ 270.125561][T10122] ? vprintk_emit+0x239/0x3a0 [ 270.125563][T10122] ? vprintk_default+0x28/0x30 [ 270.125565][T10122] ? vprintk_func+0x158/0x170 [ 270.125566][T10122] ? printk+0x62/0x8d [ 270.125568][T10122] ? no_context+0x66d/0xc80 [ 270.125569][T10122] ? no_context+0x6e3/0xc80 [ 270.125571][T10122] ? __bad_area_nosemaphore+0x108/0x470 [ 270.125573][T10122] ? vprintk_emit+0x239/0x3a0 [ 270.125575][T10122] ? bad_area_nosemaphore+0x2d/0x40 [ 270.125577][T10122] ? __do_page_fault+0x1a4/0x1f0 [ 270.125578][T10122] ? do_page_fault+0x99/0xb0 [ 270.125580][T10122] ? page_fault+0x39/0x40 [ 270.125582][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 270.125584][T10122] #PF: supervisor read access in kernel mode [ 270.125586][T10122] #PF: error_code(0x0000) - not-present page [ 270.125588][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 270.125597][T10122] Thread overran stack, or stack corrupted [ 270.125598][T10122] Oops: 0000 [#32] PREEMPT SMP KASAN [ 270.125601][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 270.125603][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.125605][T10122] Workqueue: events bpf_prog_free_deferred [ 270.125609][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 270.125614][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 270.125615][T10122] RSP: 0018:ffff8880938ff850 EFLAGS: 00010806 [ 270.125619][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 270.125622][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 270.125632][T10122] RBP: ffff8880938ff888 R08: ffffffff817dc0cb R09: 0000000000000001 [ 270.125635][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 270.125637][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 270.125639][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 270.125642][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.125644][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 270.125645][T10122] Call Trace: [ 270.125647][T10122] ? sprintf+0x71/0x90 [ 270.125649][T10122] ? msg_print_text+0x16e/0x4a0 [ 270.125651][T10122] ? __kasan_check_write+0x14/0x20 [ 270.125653][T10122] ? do_raw_spin_lock+0xea/0x2d0 [ 270.125654][T10122] ? console_unlock+0x4e4/0xef0 [ 270.125656][T10122] ? __down_trylock_console_sem+0x180/0x1b0 [ 270.125658][T10122] ? vprintk_emit+0x21c/0x3a0 [ 270.125660][T10122] ? vprintk_emit+0x239/0x3a0 [ 270.125661][T10122] ? vprintk_default+0x28/0x30 [ 270.125663][T10122] ? vprintk_func+0x158/0x170 [ 270.125665][T10122] ? printk+0x62/0x8d [ 270.125666][T10122] ? no_context+0x66d/0xc80 [ 270.125668][T10122] ? no_context+0x6e3/0xc80 [ 270.125670][T10122] ? __bad_area_nosemaphore+0x108/0x470 [ 270.125672][T10122] ? vprintk_emit+0x239/0x3a0 [ 270.125673][T10122] ? bad_area_nosemaphore+0x2d/0x40 [ 270.125675][T10122] ? __do_page_fault+0x1a4/0x1f0 [ 270.125677][T10122] ? do_page_fault+0x99/0xb0 [ 270.125678][T10122] ? page_fault+0x39/0x40 [ 270.125682][T10122] usercopy: Kernel memory overwrite attempt detected to SLAB object 'kmalloc-1k' (offset 1134, size 1)! [ 270.125683][T10122] ------------[ cut here ]------------ [ 270.125685][T10122] kernel BUG at mm/usercopy.c:98! [ 270.125687][T10122] invalid opcode: 0000 [#33] PREEMPT SMP KASAN [ 270.125690][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 270.125692][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.125694][T10122] Workqueue: events bpf_prog_free_deferred [ 270.125697][T10122] RIP: 0010:usercopy_abort+0x8d/0x90 [ 270.125702][T10122] Code: 4e 3f 88 48 0f 44 de 48 c7 c7 e7 a6 3e 88 4c 89 ce 4c 89 d1 4d 89 d8 49 89 c1 31 c0 41 57 41 56 53 e8 7a 40 a9 ff 48 83 c4 18 <0f> 0b 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 20 41 89 [ 270.125703][T10122] RSP: 0018:ffff8880938ff0b8 EFLAGS: 00010086 [ 270.125707][T10122] RAX: 0000000000000068 RBX: ffffffff883f4e3f RCX: beec81ecf24a1100 [ 270.125709][T10122] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 270.125712][T10122] RBP: ffff8880938ff0d0 R08: ffffffff817d7a69 R09: ffffed1015d644d6 [ 270.125714][T10122] R10: ffffed1015d644d6 R11: 0000000000000000 R12: 01fffc0000010200 [ 270.125716][T10122] R13: 0000000000000001 R14: 000000000000046e R15: 0000000000000001 [ 270.125719][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 270.125721][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.125723][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 270.125724][T10122] Call Trace: [ 270.125726][T10122] ? sprintf+0x71/0x90 [ 270.125728][T10122] ? msg_print_text+0x16e/0x4a0 [ 270.125730][T10122] ? __kasan_check_write+0x14/0x20 [ 270.125731][T10122] ? do_raw_spin_lock+0xea/0x2d0 [ 270.125733][T10122] ? console_unlock+0x4e4/0xef0 [ 270.125735][T10122] ? __down_trylock_console_sem+0x180/0x1b0 [ 270.125737][T10122] ? vprintk_emit+0x21c/0x3a0 [ 270.125739][T10122] ? vprintk_emit+0x239/0x3a0 [ 270.125740][T10122] ? vprintk_default+0x28/0x30 [ 270.125742][T10122] ? vprintk_func+0x158/0x170 [ 270.125744][T10122] ? printk+0x62/0x8d [ 270.125752][T10122] ? no_context+0x66d/0xc80 [ 270.125754][T10122] ? no_context+0x6e3/0xc80 [ 270.125756][T10122] ? __bad_area_nosemaphore+0x108/0x470 [ 270.125758][T10122] ? vprintk_emit+0x239/0x3a0 [ 270.125760][T10122] ? bad_area_nosemaphore+0x2d/0x40 [ 270.125762][T10122] ? __do_page_fault+0x1a4/0x1f0 [ 270.125764][T10122] ? do_page_fault+0x99/0xb0 [ 270.125765][T10122] ? page_fault+0x39/0x40 [ 270.125768][T10122] BUG: unable to handle page fault for address: fffffbfff4001000 [ 270.125770][T10122] #PF: supervisor read access in kernel mode [ 270.125772][T10122] #PF: error_code(0x0000) - not-present page [ 270.125774][T10122] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD a97ee067 PTE 0 [ 270.125782][T10122] Thread overran stack, or stack corrupted [ 270.125784][T10122] Oops: 0000 [#34] PREEMPT SMP KASAN [ 270.125788][T10122] CPU: 1 PID: 10122 Comm: kworker/1:3 Not tainted 5.3.0-rc4+ #77 [ 270.125792][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.125794][T10122] Workqueue: events bpf_prog_free_deferred [ 270.125797][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 270.125802][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 270.125804][T10122] RSP: 0018:ffff8880938fedc8 EFLAGS: 00010806 [ 270.125808][T10122] RAX: 1ffffffff4001000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 270.125810][T10122] RDX: ffff888089fbc600 RSI: ffffffffff7a5590 RDI: ffffffffa0008000 [ 270.125812][T10122] RBP: ffff8880938fee00 R08: ffffffff817dc0cb R09: 0000000000000001 [ 270.125815][T10122] R10: fffffbfff117be6d R11: 0000000000000000 R12: ffffffffa0008000 [ 270.125817][T10122] R13: 0000000000000000 R14: ffffffffff7a5590 R15: ffff8880a97bc038 [ 270.125820][T10122] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 270.125822][T10122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.125824][T10122] CR2: fffffbfff4001000 CR3: 0000000095a1e000 CR4: 00000000001406e0 [ 270.125825][T10122] Call Trace: [ 270.125827][T10122] Modules linked in: [ 270.125830][T10122] CR2: fffffbfff4001000 [ 270.125832][T10122] ---[ end trace c565c041ab286cd3 ]--- [ 270.125834][T10122] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 270.125838][T10122] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 270.125839][T10122] R [ 270.125844][T10122] Lost 11 message(s)!